A Systematic Approach for Ensuring Security and Efficiency in Cloud Computing
Keywords:
CLC, IKE, Certification Authority, Sensitivity Rating, Random Key ReusabilityAbstract
Cloud Computing is the latest trend of today’s IT industries. It is the solution for the problem that occurs due to the resources availability and its utilization over the network. The popularity of cloud computing has increased due to its great policy of pay-as-you-use or resource-on-demand but still it lacks with certain issues of security, trust and efficiency when implemented or deployed on large enterprise such as in geological surveys, scientific applications, astrological applications, oceanography etc. There exist lots of solution in security issues and lots of research for its efficiency but none of them focus on the both issues together. In this paper we have proposed a model that will provide solution for both of these issues. The work mainly focus on the fast scheduling of events in cloud computing by using private key cryptosystem instead of public key cryptosystem and instead of using traditional IKE i.e. internet key exchange mechanism we used the concept of random key reusability which is an approach for providing authenticate and efficient key exchange as that of IKE. Also the various section are made for storing users data on basis of the confidentiality, authentication and integrity that will enhance the overall security of the data stored and retrieved in the cloud computing.
References
Dimitrios Zissis, Dimitrios Lekkas “Addressing cloud computing security issues” Future Generation Computer Systems, Elsevier, 2012.
Rabai, L.B.A. et al., A cyber security model in cloud computing environments. Journal of King Saud University – Computer and Information Sciences (2012).
Rong C et al. Beyond lightning: A survey on security challenges in cloud computing. Comput Electr Eng (2012)
Shivlal Mewada, Umesh Kumar Singh and Pradeep Kumar Sharma, " Security Enhancement in Cloud Computing (CC)”, ISROSET- IJSRCSE, Vol-1, Issue-1, pp(31-37), Jan-Feb 2013
Shivlal Mewada, Umesh Kumar Singh, Pradeep Sharma,“Security Based Model for Cloud Computing”, Int. Journal of Computer Networks and Wireless Communications (IJCNWC), Vol. 1, No. 1, pp (13-19), December 2011.
R. Buyya, C.S. Yeo, S. Venugopal, J. Broberg, I. Brandic, Cloud computing and emerging it platforms: vision, hype, and reality for delivering computing as the 5th utility, Future Generation Computer Systems 25 (2009) 599–616.
Cong Wang, Qian Wang, and Kui Ren, Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing, IEEE INFOCOM 2010.
I.M. Abbadi, M. Alawneh / Computers and Electrical Engineering 38 (2012) 1073–1087
S. Marston et al. / Decision Support Systems 51 (2011) 176–189
Shuai Zhang and Shufen Zhang “Cloud Computing Research and Development Trend”, IEEE, Second International Conference on Future Networks, 2010
K. Salah ,J. M. Alcaraz-Calero,S. Zeadally ,S. Almulla and M. Alzaabi “Using Cloud Computing to Implement a Security Overlay Network”, IEEE, Security and Privacy, 2011
S. Marston et al.,Decision Support Systems 51 (2011)
National Institute of Standards and Technology. The NIST definition of cloud computing; 2011.http://www.nist.gov/itl/cloud/upload/cloud-defv15. pdf
J. Yao, S. Chen, S. Nepal, D. Levy, J. Zic, Truststore: making Amazon S3 trustworthy with services composition, in: Proceedings of the 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, CCGRID’08, Melbourne, Australia, 2010, pp. 600–605
N. Cao, Z. Yang, C. Wang, K. Ren, W. Lou, Privacy-preserving query over encrypted graph-structured data in cloud computing, in: IEEE International Conference on Distributed ComputingSystems, ICDCS’11, 2011, pp. 393–402.
Pradeep Bhosale, Priyanka Deshmukh, Girish Dimbar, Ashwin iDeshpande: Enhancing Data Security in Cloud Computing Using 3D Framework & Digital Signature with Encryption-International Journal of Engineering Research & Technology (IJERT), Vol. 1 Issue 8, October – 2012
F. Hu, M. Qiu, J. Li, T. Grant, D. Tylor, S. Mccaleb, L. Butler, R. Hamner, A Review on Cloud Computing : Design Challenges in Architecture and Security, Journal of Computing and Information Technology, 19 (1) (2011)
A. Groce, J. Katz, A new framework for efficient password-based authenticated key exchange, in: Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS’10, Chicago, USA, 2010, pp. 516–525
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.