scispace - formally typeset
Search or ask a question
Author

Vikas Goyal

Other affiliations: Kurukshetra University
Bio: Vikas Goyal is an academic researcher from National Institute of Technology, Kurukshetra. The author has contributed to research in topics: Cloud computing & Cloud computing security. The author has an hindex of 3, co-authored 3 publications receiving 16 citations. Previous affiliations of Vikas Goyal include Kurukshetra University.

Papers
More filters
Book ChapterDOI
01 Jan 2018
TL;DR: In this research paper, strategies followed include categorization of the data on the basis of their sensitivity and importance, followed by the various cryptography techniques such as the AES (a Symmetric Cryptography technique), SHA-1 (a Hashing technique), and ECC (Elliptic curve Cryptography (an Asymmetric Cryptographic technique).
Abstract: Cloud computing is one of the most research hot topics in IT industry nowadays. A lot of startup organizations are adopting cloud eagerly due to massive cloud facilities available with minimal investment; but as every coin has two sides, so with cloud. In the cloud, the user data is stored at some off-site location. So cloud data security is one of the main concerns of any organizations, before shifting to the cloud. The data owners can ensure the data security at its premises using firewalls, VPN (Virtual Private Network) like most used security options. But as data owner stores their sensitive data to remote servers and users access required data from these remote cloud servers, which is not under their control. So storing data outside client premises, raises the issue of data security. Thus, one of the primary research areas in cloud computing is cloud data protection. In this research paper, strategies followed include categorization of the data on the basis of their sensitivity and importance, followed by the various cryptography techniques such as the AES (a Symmetric Cryptography technique), SHA-1 (a Hashing technique), and ECC (Elliptic curve Cryptography (an Asymmetric Cryptography technique). Till date, most of the authors were using a single key for both encryption and decryption which is a weak target of various identified malicious attacks. Hence, in the designed hybrid algorithm, two separate keys are used for each encryption and decryption. The cloud user who wants to access cloud data, need to first register with CSP and cloud owner. After registration, user login id, password and OTP (One Time Password) sent to the user registered mobile number, are required to access the encrypted cloud data.

20 citations

01 Jan 2011
TL;DR: In this article, a brief view of cloud computing by giving its definition, advantages, components, types, security issues and current security techniques is given, an individual surely will have a clear idea about the introduction, Advantages & Security challenges of Cloud computing.
Abstract: This paper gives a brief view of Cloud computing by giving its definition, advantages, components, types, security issues & current security techniques. By reading this paper, an individual surely will have a clear idea about the introduction, Advantages & Security challenges of Cloud computing.

4 citations

Proceedings ArticleDOI
03 Apr 2014
TL;DR: The mathematical description as well as the algorithmic approach for cloud storage optimization are proposed and as an objective optimization problem which is solved by the proposed optimized algorithm; as a result the data is distributed in appropriate nodes with the best efficiency.
Abstract: Cloud computing is offering efficacy oriented IT services to users throughout the world. It enables the hosting of assorted applications from user, scientific, commercial as well as business domains. The core inspiration following Cloud Computing is that the entire system can be controlled as well as worked using simply an HTTP client. The cloud user is required to have only a web based client to make exertions with Cloud Systems and all its applications, including office apps, business modules or personal information systems. It is applied to both modern and obsolete systems. An Open Source Platform designed to hold a wide assortment of Web Applications. Cloud Operating Systems was thought of its new definition that everything inside it can be accessed & acquired from everywhere inside a Network All the user is required to do is login into Cloud Operating Application server with a normal web client, and access to the desktop, with your documents, applications, movies, music and all etc. Cloud Operating Systems lets you upload your files and work with them regardless of your location. It contains almost all applications such as Word Processor, PDF reader, Address Book and many more developed by the Cloud developers and Cloud vendors. Cloud Storage provides the web based users with storage space and make user friendly and timely acquire and store data, which is mainly the foundation of each type of cloud applications. However, there is requirement of deep analysis on how to optimize cloud storage aiming at improvement of data accessing and data storing performance. In this paper, we have proposed the mathematical description as well as the algorithmic approach for cloud storage optimization and as an objective optimization problem which is solved by our proposed optimized algorithm; as a result the data is distributed in appropriate nodes with the best efficiency. The simulation or investigational results demonstrate the performance of the algorithms analogous to MapReduce Hadoop technology in BigData paradigm.

4 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: Higher power demand in data centers and changes in computing technology together to maximize data center performance has led to deploying multitude methods to estimate power intensity, which has resulted in new research in achieving power efficient data centers.
Abstract: A Data center comprises of servers, storage devices, cooling and power delivery equipment to support other components, exchange data and information to provide general services such as software-as-a-service (SaaS), platform-as-a-service (PaaS), and Internet-as-a-service (IaaS). Data centers require massive amount of computational power to drive complex systems. In return these massive systems bring many challenges and concerns including power dissipation and environmental sustainability. Higher power demand in data centers and changes in computing technology together to maximize data center performance has led to deploying multitude methods to estimate power intensity. Energy cost increment, global economic downturn, and global warming and other concerns have resulted in new research in achieving power efficient data centers. The research proposed in this paper evaluates three task scheduling algorithms RASA, TPPC, and PALB to get the most energy efficient task scheduling algorithm to be used in data centers for measuring their performance and efficiency. The three algorithms are evaluated for performance using three parameters; power efficiency, cost effectiveness, and amount of CO2 emissions. On top of that data center location and climate conditions are also considered and analyzed as parameters as they directly effect the operating costs, the amount of power consumption and CO2 emission. To minimize the power wasted by data center cooling systems is directly related to data center location and climate change. CloudSim simulator is used to implement the algorithms on an IaaS cloud infrastructure, to calculate the power consumption, and to analyze each algorithm׳s behavior for different parameters. The results generated clearly shows that TPPC is the most efficient algorithm due to less amount of power consumption and low volume of CO2 emission; however its implementation cost is bit higher compare to PALB and RASA.

45 citations

Journal ArticleDOI
TL;DR: This paper proposes a novel system architecture called the Secure Authentication and Data Sharing in Cloud (SADS-Cloud), which is implemented using Java Programming and performance tested for the following metrics: Information Loss, Compression Ratio, Throughput, Encryption Time and Decryption Time.

32 citations

Journal ArticleDOI
TL;DR: The MQLB-RAM resource allocation method combines needs of users and service providers to constitute multi-QoS indexes and compares weight of each index in peer to match need and resource so as to achieve the target of ensuring load balance.
Abstract: In the large-scale clustering resource pool as human-centric cloud computing, peer load balance not only improves overall system efficiency, but also saves energy. As various factors should be considered in resource scheduling and each has different emphasis, resource allocation method adapted by different scene also has respective criteria. Based on resource allocation techniques, the multi-QoS load balance resource allocation method (MQLB-RAM) was proposed in the paper. It combines needs of users and service providers to constitute multi-QoS indexes. The needs from cost, system and network were met by quantitative analysis on load balancing using real-time load of peers. The algorithm also compares weight of each index in peer to match need and resource, so as to achieve the target of ensuring load balance, making full use of resources and saving money. Simulation experiment with CloudSim shows that the MQLB-RAM can achieve balance among load, resource access performance and cost.

26 citations

Journal ArticleDOI
TL;DR: In this article, the authors have combined a nature-inspired optimisation, such as a moth search algorithm (MSA) with ECC, to select the correct and optimal value of the elliptic curve.
Abstract: In this study, elliptic curve cryptography (ECC) is elected for tenant authentication, data encryption, and data decryption due to its minimum key size. The proposed ECC-based authentication approach allows the authorised person to access private data; it protects different related attacks effectively. To develop more secure data encryption, the authors have combined a nature-inspired optimisation, such as a moth search algorithm (MSA) with ECC, to select the correct and optimal value of the elliptic curve. The proposed encryption and decryption approach combines DNA encoding with the ECC encryption algorithm. The mechanism of DNA encoded ECC provided multi-level security with less computational power. The security analysis of the proposed method has been provided to prove its effectiveness against certain attacks, such as denial-of-service attack, impersonation attack, reply attack, plaintext attack and chosen-ciphertext attack. The experimental result is evaluated based on encryption time, decryption time, throughput and key size of the security model. The average execution time of the proposed encryption and decryption is only 83.153 and 86.076 s, respectively. From the evaluation, it is clearly determined that the proposed technique provides two-layer security with minimum key size and less storage space.

17 citations

Journal Article
TL;DR: This paper proposes a method for cloud storage that allows user to store and access the data securely and guarantees that no one canAccess the data neither the cloud storage provider except the authenticated user.
Abstract: This paper addresses the need for users to trust the commercial cloud providers and the security issues of storing data in a cloud storage service. The cloud storage is one of the prominent services offered in cloud computing. Data stored over cloud in the plain text format is a security threat. This paper proposes a method for cloud storage that allows user to store and access the data securely. It also guarantees that no one can access the data neither the cloud storage provider except the authenticated user. This method provides security and privacy for data stored in public servers. Keywords— Cloud Computing Security, Cloud Storage Security, Elliptic Curve Cryptography

10 citations