Secure Virtualisation Using Hash Key Authentication

Authors

  • D. Jegalakshmi Princy  ME Scholar, Department of Computer Science, Dhanalakshmi Srinivasan College of Engineering, Perambalur, Tamil Nadu, India
  • M. Shobana  Associate Professor, Department of Computer Science, Dhanalakshmi Srinivasan College of Engineering, Perambalur, Tamil Nadu, India

DOI:

https://doi.org//10.32628/CSEIT18386

Keywords:

ABE, ECC, Access, Hypervisor, IDS.

Abstract

In the current scenario, cloud computing is new kind of computing paradigm which enables sharing of computing assets over the net. The cloud characteristics are on-call for self-service, vicinity unbiased community get right of entry to, ubiquitous community get right of entry to and usage based totally pay. Due to this charming capabilities personal and public enterprise are outsourcing their large quantity of records on cloud storage. Organizations are encouraged to migrate their facts from nearby web site to central industrial public cloud server. By outsourcing statistics on cloud customers gets alleviation from storage preservation. Although there are numerous blessings to migrate facts on cloud garage it brings many safety problems. Therefore the records owners hesitate to emigrate their sensitive data. The current technique makes use of Virtual Machines and Hypervisor Intrusion Detection System, in detecting and stopping the hypervisor attacks inside the virtualized cloud surroundings. In this work, we proposed a model which searches and get access to files which are uploaded in a network. Elliptical Curve Cryptography and Attribute Based Encryption method are implemented for secured data communication. The proposed method is implemented in real time and the results prove that the proposed method is efficient than the existing methods.

References

  1. C. Wang, S. S. Chow, Q. Wang, K. Ren, and W. Lou, "Privacy preserving public auditing for secure cloud storage," Computers, IEEE Transactions on, vol. 62, no. 2, 2013, pp. 362-375.
  2. R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, "Searchable symmetric encryption: improved definitions and efficient constructions," in Proc. ACM CCS’06, VA, USA, Oct. 2006, pp. 79-88.
  3. P. Golle, J. Staddon, and B. Waters, "Secure conjunctive keyword search over encrypted data," in Proc. Applied Cryptography and Network Security (ACNS’04), Yellow Mountain, China, Jun. 2004, pp. 31-45.
  4. L. Ballard, S. Kamara, and F. Monrose, "Achieving efficient conjunctive keyword searches over encrypted data," in Proc. Information and Communications Security (ICICS’05), Beijing, China, Dec. 2005, pp. 414-426.
  5. C. Wang, N. Cao, J. Li, K. Ren and W. Lou, "Secure ranked keyword search over encrypted cloud data," in Proc. IEEE Distributed Computing Systems (ICDCS’10), Genoa, Italy, Jun. 2010, pp. 253-262.
  6. N. Cao, C. Wang, M. Li, K. Ren and W. Lou, "Privacy preserving multi-keyword ranked search over encrypted cloud data," in Proc. IEEE INFOCOM’11, Shanghai, China, Apr. 2011, pp. 829-837.
  7. Z. Xu, W. Kang, R. Li, K. Yow and C. Xu, "Efficient multi keyword ranked query on encrypted data in the cloud," in Proc. IEEE Parallel and Distributed Systems (ICPADS’12), Singapore, Dec. 2012, pp. 244-251.
  8. C. Wang, N. Cao, K. Ren and W. Lou, "Enabling secure and efficient ranked keyword search over outsourced cloud data," Parallel and Distributed Systems, IEEE Transactions on, vol. 23, no. 8, 2012,pp. 1467-1479.
  9. T. Jung, X. Y. Li, Z. Wan and M. Wan, "Privacy preserving cloud data access with multi-authorities," in Proc. IEEE INFOCOM’ 13, Turin, Italy, Apr. 2013, pp. 2625-2633.
  10. W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y. T. Hou and H. Li, "Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking," Parallel and Distributed Systems, IEEE Transactions on, 2014,vol. 25, no. 11, pp. 3025-3035.

Downloads

Published

2018-11-30

Issue

Section

Research Articles

How to Cite

[1]
D. Jegalakshmi Princy, M. Shobana, " Secure Virtualisation Using Hash Key Authentication, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 8, pp.01-08, November-December-2018. Available at doi : https://doi.org/10.32628/CSEIT18386