Cloud Security Architecture Based on User Authentication and Symmetric Key Cryptographic Techniques

被引:0
|
作者
Wani, Abdul Raoof [1 ]
Rana, Q. P. [2 ]
Pandey, Nitin [1 ]
机构
[1] Amity Univ Noida, Noida, Uttar Pradesh, India
[2] Jamia Hamdard, New Delhi, India
来源
2017 6TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO) | 2017年
关键词
AES; SHA3; Blowfish; Cloud Security Architecture; Cloud computing;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud computing environment gives people to share resources, services and information. This environment is adopted by large number of organizations, so the rapid transition towards the cloud has fuelled concerns on security perspective. Encryption algorithms play main role in solving such kind of problems in the cloud computing environment. This paper proposes the structure for cloud security with efficient security in communication system and AES based file encryption system. This security architecture can be easily applied on PaaS, IaaS and SaaS and one time password provides extra security in the authenticating users. This paper presents the security of whole cloud computing environment.
引用
收藏
页码:529 / 534
页数:6
相关论文
共 50 条
  • [31] Keystroke dynamics-based user authentication service for cloud computing
    Abo-alian, Alshaimaa
    Badr, Nagwa L.
    Tolba, M. F.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (09): : 2567 - 2585
  • [32] EchoIA: A Cloud-Based Implicit Authentication Leveraging User Feedback
    Yang, Yingyuan
    Li, Jiangnan
    Lee, Sunshin
    Huang, Xueli
    Sun, Jinyuan
    NETWORK, 2022, 2 (01): : 190 - 202
  • [33] Healthcare Data Security in Cloud Storage Using Light Weight Symmetric Key Algorithm
    Parthasarathy, Vimala Devi
    Visvalingam, Kalaichelvi
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2024, 21 (01) : 57 - 66
  • [34] A Symmetric Key Cryptographic Technique Based on Frame Rotation of an Even Ordered Square Matrix
    Goswami , Joyita
    Paul, Manas
    INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, VOL 1, 2015, 339 : 319 - 328
  • [35] A Token-based Authentication and Key Agreement Protocol for Cloud Computing
    Xu, Zisang
    Xu, Jianbo
    Kuang, Li-Dan
    2021 IEEE 6TH INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD 2021), 2021, : 38 - 43
  • [36] Towards a New Security Approach Based on Heartbeat Authentication to Ensure Security of Cloud Data Access
    Hammami, Hamza
    Brahmi, Hanen
    Ben Yahia, Sadok
    2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 37 - 43
  • [37] User Behaviour Authentication Model Based on Stochastic Petri Net in Cloud Environment
    Li, Peng
    Yang, Cheng
    Xu, He
    Lau, Ting Fung
    Wang, Ruchuan
    PARALLEL ARCHITECTURE, ALGORITHM AND PROGRAMMING, PAAP 2017, 2017, 729 : 59 - 69
  • [38] An Integrated Architecture for Maintaining Security in Cloud Computing Based on Blockchain
    Awadallah, Ruba
    Samsudin, Azman
    Teh, Je Sen
    Almazrooie, Mishal
    IEEE ACCESS, 2021, 9 : 69513 - 69526
  • [39] Security Architecture based on Defense in Depth for Cloud Computing Environment
    Mavroeidakos, Theodoros
    Michalas, Angelos
    Vergados, Dimitrios D.
    2016 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2016,
  • [40] A Cloud Computing Based Architecture for Cyber Security Situation Awareness
    Yu, Wei
    Xu, Guobin
    Chen, Zhijiang
    Moulema, Paul
    2013 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2013, : 488 - 492