Cloud Security Architecture Based on User Authentication and Symmetric Key Cryptographic Techniques

被引:0
|
作者
Wani, Abdul Raoof [1 ]
Rana, Q. P. [2 ]
Pandey, Nitin [1 ]
机构
[1] Amity Univ Noida, Noida, Uttar Pradesh, India
[2] Jamia Hamdard, New Delhi, India
来源
2017 6TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO) | 2017年
关键词
AES; SHA3; Blowfish; Cloud Security Architecture; Cloud computing;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud computing environment gives people to share resources, services and information. This environment is adopted by large number of organizations, so the rapid transition towards the cloud has fuelled concerns on security perspective. Encryption algorithms play main role in solving such kind of problems in the cloud computing environment. This paper proposes the structure for cloud security with efficient security in communication system and AES based file encryption system. This security architecture can be easily applied on PaaS, IaaS and SaaS and one time password provides extra security in the authenticating users. This paper presents the security of whole cloud computing environment.
引用
收藏
页码:529 / 534
页数:6
相关论文
共 50 条
  • [41] A Double Tap Key based Security Model in Cloud Applications
    Lakshmi, M. Prasanna
    Yaswanth, J. Venkata
    Sowbhagyalakshmi, B.
    2024 4TH INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND SOCIAL NETWORKING, ICPCSN 2024, 2024, : 566 - 571
  • [42] Identity based secure authentication scheme based on quantum key distribution for cloud computing
    Sharma, Geeta
    Kalra, Sheetal
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (02) : 220 - 234
  • [43] Identity based secure authentication scheme based on quantum key distribution for cloud computing
    Geeta Sharma
    Sheetal Kalra
    Peer-to-Peer Networking and Applications, 2018, 11 : 220 - 234
  • [44] Architecture and Key Issues of IMS-based Cloud Computing
    Zhang, Wei
    Lei, Weimin
    Chen, Xiao
    Liu, Shaowei
    2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2013), 2013, : 629 - 635
  • [45] Authentication and Key Agreement Based on Anonymous Identity for Peer-to-Peer Cloud
    Zhong, Hong
    Zhang, Chuanwang
    Cui, Jie
    Xu, Yan
    Liu, Lu
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (03) : 1592 - 1603
  • [46] Performance analysis of privacy preservation-based authentication scheme and cryptographic-based data protocols for DSaC in cloud
    Pawar, Ankush Balaram
    Ghumbre, Shashikant U.
    Jogdand, Rashmi M.
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2023, 22 (3-4) : 298 - 322
  • [47] Fuzzy logic Approach Based on User behavior Trust in Cloud Security
    Alruwaythi, Maryam
    Nygard, Kendall E.
    2019 IEEE INTERNATIONAL CONFERENCE ON ELECTRO INFORMATION TECHNOLOGY (EIT), 2019,
  • [48] Preserving user query privacy in cloud-based security services
    Chen, Yen-Chung
    Wu, Yu-Sung
    Tzeng, Wen-Guey
    JOURNAL OF COMPUTER SECURITY, 2014, 22 (06) : 997 - 1024
  • [49] Evaluation of Multifactor User Security Through Multi Authentication Verifiable Hybrid Revert Encryption for Cloud Computing Environment
    Ubada, J. Mohammed
    Surputheen, M. Mohamed
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (09): : 481 - 488
  • [50] Provably Secure Authentication Approach for Data Security in Cloud Using Hashing, Encryption, and Chebyshev-Based Authentication
    Ahamad, Danish
    Akhtar, Md Mobin
    Hameed, Shabi Alam
    Al Qerom, Mahmoud Mohammad Mahmoud
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2022, 16 (01)