scispace - formally typeset
Proceedings ArticleDOI

Use of Digital Signature with Diffie Hellman Key Exchange and AES Encryption Algorithm to Enhance Data Security in Cloud Computing

TLDR
This paper has proposed to make use of digital signature and Diffie Hellman key exchange blended with (AES) Advanced Encryption Standard encryption algorithm to protect confidentiality of data stored in cloud.
Abstract
Cloud computing is the apt technology for the decade It allows user to store large amount of data in cloud storage and use as and when required, from any part of the world, via any terminal equipment Since cloud computing is rest on internet, security issues like privacy, data security, confidentiality, and authentication is encountered In order to get rid of the same, a variety of encryption algorithms and mechanisms are used Many researchers choose the best they found and use it in different combination to provide security to the data in cloud On the similar terms, we have chosen to make use of a combination of authentication technique and key exchange algorithm blended with an encryption algorithm This combination is referred to as "Three way mechanism" because it ensures all the three protection scheme of authentication, data security and verification, at the same time In this paper, we have proposed to make use of digital signature and Diffie Hellman key exchange blended with (AES) Advanced Encryption Standard encryption algorithm to protect confidentiality of data stored in cloud Even if the key in transmission is hacked, the facility of Diffie Hellman key exchange render it useless, since key in transit is of no use without user's private key, which is confined only to the legitimate user This proposed architecture of three way mechanism makes it tough for hackers to crack the security system, thereby protecting data stored in cloud

read more

Citations
More filters
Journal ArticleDOI

VerifyNet: Secure and Verifiable Federated Learning

TL;DR: VerifyNet is proposed, the first privacy-preserving and verifiable federated learning framework that claims that it is impossible that an adversary can deceive users by forging Proof, unless it can solve the NP-hard problem adopted in the model.
Journal ArticleDOI

A survey on cloud computing security

TL;DR: This survey presents a comprehensive overview of the security issues for different factors affecting cloud computing, and encompasses the requirements for better security management and suggests 3-tier security architecture.
Journal ArticleDOI

Cybersecurity for industrial control systems: A survey

TL;DR: This work discusses the major works, from industry and academia towards the development of the secure ICSs, especially applicability of the machine learning techniques for the ICS cyber-security and may help to address the challenges of securing industrial processes, particularly while migrating them to the cloud environments.
Posted Content

Cybersecurity for Industrial Control Systems: A Survey

TL;DR: In this paper, the authors have discussed the major works from industry and academia towards the development of the secure industrial control system (ICS) especially applicability of the machine learning techniques for the ICS cyber-security.
Journal ArticleDOI

A Review on Data Security in Cloud Computing

TL;DR: In this study, an attempt is made to review the research in this field of cloud computing and the results are categorized on the basis of type of approach and the type of validation used to validate the approach.
References
More filters
Proceedings ArticleDOI

Cloud Security Issues

TL;DR: Some security issues that have to be included in service level agreements (SLA) are put forward to help some of the enterprises to look forward in using the cloud services.
Proceedings ArticleDOI

Data Security and Privacy Protection Issues in Cloud Computing

TL;DR: This paper provides a concise but all-round analysis on data security and privacy protection issues associated with cloud computing across all stages of data life cycle and describes future research work about dataSecurity and privacy Protection issues in cloud.
Posted Content

An Analysis of the Cloud Computing Security Problem

TL;DR: A detailed analysis of the cloud security problem is introduced and key features that should be covered by any proposed security solution are derived.
Proceedings Article

Security threats in cloud computing

TL;DR: This study aims to identify the most vulnerable security threats in cloud computing, which will enable both end users and vendors to know about the key security threats associated with cloud computing.
Proceedings ArticleDOI

Implementing digital signature with RSA encryption algorithm to enhance the Data Security of cloud in Cloud Computing

TL;DR: This Research Paper has tried to assess Cloud Storage Methodology and Data Security in cloud by the Implementation of digital signature with RSA algorithm.