CFP last date
20 January 2025
Reseach Article

Secure Cloud Computing with RC4 Encryption and Attack Detection Mechanism

by Laxmikant Mishra, Amit Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 117 - Number 14
Year of Publication: 2015
Authors: Laxmikant Mishra, Amit Sharma
10.5120/20626-3401

Laxmikant Mishra, Amit Sharma . Secure Cloud Computing with RC4 Encryption and Attack Detection Mechanism. International Journal of Computer Applications. 117, 14 ( May 2015), 40-45. DOI=10.5120/20626-3401

@article{ 10.5120/20626-3401,
author = { Laxmikant Mishra, Amit Sharma },
title = { Secure Cloud Computing with RC4 Encryption and Attack Detection Mechanism },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 117 },
number = { 14 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 40-45 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume117/number14/20626-3401/ },
doi = { 10.5120/20626-3401 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:59:26.568576+05:30
%A Laxmikant Mishra
%A Amit Sharma
%T Secure Cloud Computing with RC4 Encryption and Attack Detection Mechanism
%J International Journal of Computer Applications
%@ 0975-8887
%V 117
%N 14
%P 40-45
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The growing requirement of system resources, memory requirement and huge space etc. have sprinted up the demand of cloud computing. The ease in the use and dynamic demand completion nature will also make it a future business platform. But we cannot forget the second side of the coin as the ease will comes with some negative cost. By the growing demand huge amount of data has been uploaded, update and shared. But data sharing and updating in the cloud environment may be risky. There are some trust mechanism should be there to secure the data. Our paper main motivation is to secure the sharing environment by sharing the data by the use of RC4 encryption and decryption mechanism. Then we have also detected the unauthorized data connection if there by our dynamic attack alert system.

References
  1. MM. Armbrust, A. Fox, R. Grif?th, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "Above the clouds: A berkeley view of cloud computing," University of California, Berkeley, Tech. Rep. UCB-EECS-2009-28, Feb 2009.
  2. Igor Ruiz-Agundez, Yoseba K. Penya and Pablo G. Bringas, "Cloud Computing Services Accounting", International Journal of Advanced Computer Research (IJACR) ,Volume 2, Number 2, June 2012.
  3. Ajey Singh, Maneesh Shrivastava, "Overview of Security issues in Cloud Computing", International Journal of Advanced Computer Research (IJACR) Volume 2,Number 1,March 2012.
  4. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, "Provable Data Possession at Untrusted Stores," Proc. 14th ACM Conf. Computer and Comm. Security (CCS '07), pp. 598-609, 2007.
  5. Ashutosh Kumar Dubey, Animesh Kumar Dubey, Mayank Namdev, Shiv Shakti Shrivastava," Cloud-User Security Based on RSA and MD5 Algorithm for Resource Attestation and Sharing in Java Environment", CONSEG-2012.
  6. A. Juels and B. S. Kaliski Jr. , "Pors: Proofs of Retrievability for Large Files," Proc. 14th ACM Conf. Computer and Comm. Security (CCS '07), pp. 584-597, 2007.
  7. H. Shacham and B. Waters, "Compact Proofs of Retrievability," Proc. 14th Int'l Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT '08), pp. 90-107, 2008.
  8. K. D. Bowers, A. Juels, and A. Oprea, "Proofs of Retrievability: Theory and Implementation," Report 2008/175, Cryptology ePrint Archive, 2008.
  9. M. Naor and G. N. Rothblum, "The Complexity of Online Memory Checking," Proc. 46th Ann. IEEE Symp. Foundations of Computer Science (FOCS '05), pp. 573-584, 2005.
  10. Wei-Tek Tsai, Xin Sun, Janaka Balasooriya , "Service-Oriented Cloud Computing Architecture" , 2010 Seventh International Conference on Information Technology.
  11. G K Patra, Nilotpal Chakraborty," Securing Cloud Infrastructure for High Performance Scientific Computations Using Cryptographic Techniques", International Journal of Advanced Computer Research (IJACR) ,Volume-4 Number-1 Issue-14 March-2014.
  12. Nilesh Pachorkar, Rajesh Ingle," Multi-dimensional Affinity Aware VM Placement Algorithm in Cloud Computing", International Journal of Advanced Computer Research (IJACR) Volume-3 Number-4 Issue-13 December-2013.
  13. Tschinkel, Brian. "Cloud Computing Security Understanding Risk Areas & Management Techniques. " (2011).
  14. Ashutosh Kumar Dubey, Animesh Kumar Dubey,Vipul Agarwal, Yogeshver Khandagre, "Knowledge Discovery with a Subset-Superset Approach for Mining Heterogeneous Data with Dynamic Support",Conseg-2012.
  15. Ashutosh K. Dubey, Ganesh Raj Kushwaha and Nishant Shrivastava,? Heterogeneous Data Mining Environment Based on DAM for Mobile Computing Environments, Information Technology and Mobile Communication Communications in Computer and Information Science, 2011, Springer LNCS.
  16. Chenguang Wang, Huaizhi Yan," Study of Cloud Computing Security Based on Private Face Recognition",IEEE 2010.
  17. Ling Zheng, Yanxiang Hu,Chaoran Yang," Design and research on private cloud computing architecture to Support Smart Grid", Third International Conference on Intelligent Human-Machine Systems and Cybernetics, 2011.
  18. Ming Li, Shucheng Yu, Ning Cao and Wenjing Lou," Authorized Private Keyword Search over Encrypted Data in Cloud Computing", 31st International Conference on Distributed Computing Systems, 2011.
  19. Yanjiang Yang," Towards Multi-User Private Keyword Search for Cloud Computing", IEEE 4th International Conference on Cloud Computing, 2011.
  20. Wang, Qian, Cong Wang, Kui Ren, Wenjing Lou, and Jin Li. "Enabling public auditability and data dynamics for storage security in cloud computing. " Parallel and Distributed Systems, IEEE Transactions on 22, no. 5 (2011): 847-859.
  21. Nilesh Pachorkar and Rajesh Ingle, " Affinity Aware VM Colocation Mechanism for Cloud " , International Journal of Advanced Computer Research (IJACR), Volume-4, Issue-17, December-2014 ,pp. 956-960.
  22. Surya Prabha. U. S, Marikkannu. P, Arul Vineeth. A. D, " Ciphertext Policy Attribute Set Based Encryption with One-Fold Data Access in Cloud " , International Journal of Advanced Computer Research (IJACR), Volume-4, Issue-14, March-2014 ,pp. 110-115.
  23. Pritam Fulsoundar, Rajesh Ingle, " Prediction of Performance Degradation in Cloud Computing " , International Journal of Advanced Computer Research (IJACR), Volume-3, Issue-13, December-2013 ,pp. 126-129.
  24. Sampada Kembhavi and Gajendra Singh, " Auto Upload and Chi-Square Test on Application Software as a Service for Cloud Computing Environment " , International Journal of Advanced Technology and Engineering Exploration (IJATEE), Volume-1, Issue-1, December-2014 ,pp. 26-31.
  25. Sampada Kembhavi, Ravindra Gupta, Gajendra Singh, " An Efficient Algorithm for Auto Upload and Chi-Square Test on Application Software " , International Journal of Advanced Computer Research (IJACR), Volume-3, Issue-10, June-2013 ,pp. 121-125.
  26. Naqvi, S. ; Michot, A. ; Van de Borne, M. , "Analysing Impact of Scalability and Heterogeneity on the Performance of Federated Cloud Security," Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on , vol. , no. , pp. 1137,1142, 25-27 June 2012.
  27. Tianfield, H. , "Security issues in cloud computing," Systems, Man, and Cybernetics (SMC), 2012 IEEE International Conference on , vol. , no. , pp. 1082,1089, 14-17 Oct. 2012.
  28. Abuhussein, A. ; Bedi, H. ; Shiva, S. , "Evaluating security and privacy in cloud computing services: A Stakeholder's perspective," Internet Technology And Secured Transactions, 2012 International Conference for, vol. , no. , pp. 388,395, 10-12 Dec. 2012.
  29. Wentao Liu, "Research on cloud computing security problem and strategy," Consumer Electronics, Communications and Networks (CECNet), 2012 2nd International Conference on , vol. , no. , pp. 1216,1219, 21-23 April 2012.
  30. Pant, N. ; Parappa, S. , "Seeding the cloud in a secured way: Cloud adoption and security compliance assessment methodologies," Software Engineering and Service Science (ICSESS), 2013 4th IEEE International Conference on, vol. , no. , pp. 305, 308, 23-25 May 2013.
  31. Du meng," Data security in cloud computing", The 8th International Conference on Computer Science & Education (ICCSE 2013) April 26-28, 2013. Colombo, Sri Lanka.
  32. Fan Yang; Li Pan; Muzhou Xiong; Shanyu Tang, "Establishment of Security Levels in Trusted Cloud Computing Platforms," Green Computing and Communications (GreenCom), 2013 IEEE and Internet of Things (iThings/CPSCom), IEEE International Conference on and IEEE Cyber, Physical and Social Computing , vol. , no. , pp. 2119,2122, 20-23 Aug. 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing RC4 Security Attack Alert.