scispace - formally typeset
Search or ask a question

Architecture to Implement Secure Cloud Computing with Elliptic Curve Cryptography

01 Jun 2015-Vol. 5, Iss: 3, pp 201-208
TL;DR: This paper designs the Multi-Server Cloud Computing system, employing Elliptic Curve Cryptography for client authentication process and data storage, and chooses not to store encryption keys anywhere in the cloud because of the secret isolation guideline.
Abstract: Cloud computing is an emerging domain that enables the deployment of a new IT service paradigm. Cloud providers offer a wide range of services which are charged per unit basis. The major challenge facing clouds is security. It includes ensuring the safety of the infrastructure as well as protection against unauthorized access. In this paper, we deal with cloud security services, including key agreements and authentication. By employing Elliptic Curve Cryptography for client authentication process and data storage, we design the Multi-Server Cloud Computing system. Our scheme chooses not to store encryption keys anywhere in the cloud because of the secret isolation guideline. A request counter is used at the time of the client authentication process to prevent replay attacks. To aid in controlled access, a mandatory access control model is preferred. We split the encrypted data and store it on different clouds, which provides security against attacks on the storage server. Restrictions are imposed to ensure only selected employees (administrators) have authority to handle the encrypted data. Our Multi-Server Cloud Computing system is used to fit an environment in which each cloud contains multiple servers that collaborate in serving applications. One cloud is used for client authentication and key agreement, and another cloud for data splitting and combining. Due to strong security and operation efficiency, the proposed secure cloud computing should be most suitable for use in a cloud computing environment.
Citations
More filters
Journal ArticleDOI
30 Dec 2019
TL;DR: The paper also scope in developing one such adaptable and highly secure information maintenance using the Cryptography integrated Computational intelligence (CICI) for application deployment in the multi cloud architecture.
Abstract: The multi cloud architecture improvises the constancy of the system associated with the cloud computing as they offer benefits such as the reducing the severity of the vendor lock in, which is the major impediment to the cloud service adoption. However the information maintenance in the multi cloud architecture is a very tedious and challenging as it inherits multitudes of complexity due to various services rendered, interfaces and technologies used. As storage is the fundamental usage of the cloud computing, the failures in the information maintenance (storage, securing, retrieval) in the traditional cloud computing has led to the development of different techniques that are highly reliable and flexible. The paper also scope in developing one such adaptable and highly secure information maintenance using the Cryptography integrated Computational intelligence (CICI) for application deployment in the multi cloud architecture. The proposed method is validated using the network simulator –Two, to verify the performance augmentation of the multi-cloud architecture in its information maintenance.

12 citations


Cites methods from "Architecture to Implement Secure Cl..."

  • ...Mukhopadhyay et al [9] presents the “architecture that enables the Secure Cloud Computing with Elliptic Curve Cryptography” Junghanns et al [10] deals with the “methods in addressing the security and the privacy issues that are associated with the data storage in the public cloud services”...

    [...]

  • ...Pitchai, et al [8] provides the “methods to predict the availability and the integrity of the data in the cloud using the soft computing” Mukhopadhyay et al [9] presents the “architecture that enables the Secure Cloud Computing with Elliptic Curve Cryptography” Junghanns et al [10] deals with the “methods in addressing the security and the privacy issues that are associated with the data storage in the public cloud services” Pages: 113- 124 http://irojournals.com/jscp/ DOI: https://doi.org/10.36548/jscp.2019.2.006 116 ISSN: 2582-2640 (online) Fig.1....

    [...]

Journal ArticleDOI
TL;DR: An efficient and provably secure authentication mechanism is proposed to give a legitimate user the right to access and manage the cloud resources.
Abstract: Cloud computing is a new, promising emerging technology which provides a variety of services over the public network. Such as software, hardware, data storage and infrastructure services. It is widely used because it offers high processing power, wide range of storage space and high computational speed. It provides a convenient on demand network access to a pool of shared services and resources via public networks. So enterprises can use the available services and resources to develop, host, and run services over their infrastructure in a flexible way anytime, anywhere with minimal management efforts. This makes cloud computing efficient, flexible and cost effective tool for business development and growth. On the other hand, the adoption of cloud computing suffers from security and privacy deficiency, which became significant challenge. In this paper; an efficient and provably secure authentication mechanism is proposed to give a legitimate user the right to access and manage the cloud resources.

1 citations


Cites background from "Architecture to Implement Secure Cl..."

  • ...3 Advantages of Using Elliptic Curve Over RSA:[11] a) Smaller key size compared with RSA (163bit of EC gives 1029 RSA)....

    [...]

References
More filters
01 Jun 2015
TL;DR: This paper analyzes different secure routing protocols and does a comprehensive survey in terms of their application areas, key distribution schemes, authentication schemes, basic security requirements, and their defense against different attacks.
Abstract: Wireless Sensor Networks is an emergent field in computer network domains, and routing plays a key role in every wireless sensor network. In a wireless sensor network, an adversary can disturb the entire network by attacking routing services. These attacks are relatively easy to deploy against a wireless sensor network as opposed to traditional wired networks, because of the unattended nature of the deployment of sensor nodes. In the case of wireless sensor networks, the compromised routing messages result in the diffusion of incorrect routing information, which can disrupt network behavior. When considering these realities, securing a routing protocol is a key objective of every wireless sensor network. In this paper, we analyze different secure routing protocols and do a comprehensive survey in terms of their application areas, key distribution schemes, authentication schemes, basic security requirements, and their defense against different attacks. To make our survey more precise, we categorized the secure routing protocols into four groups: secure data-centric, secure hierarchical, secure location-based, and secure quality-of-service routing protocols. All secure routing protocols discussed in this survey paper fall under these four categories.

13 citations

01 Jun 2015
TL;DR: This paper focuses on the structure of knowledge representation for image analysis from a global perspective, which can also be applied to image classification, retrieval, and object recognition.
Abstract: More images are available nowadays because of the development of techniques to effectively and automatically analyze images. These techniques have become a key challenge in computer vision. In this paper, we focus on the structure of knowledge representation for image analysis from a global perspective, which can also be applied to image classification, retrieval, and object recognition. The structure is divided into two hierarchies, implicit and explicit knowledge representation. Implicit knowledge representation utilizes low-level features to directly categorize an image, whereas explicit knowledge representation depends on the inference process based on corresponding rules in a constructed knowledge base. Popular datasets for image analysis are also grouped and introduced. Contributions in the field and future research directions are reported in the conclusions.

9 citations