CFP last date
20 January 2025
Reseach Article

Trust Enhancing Model for Cloud Environment

by Kapil Kumar, Anurag Jain
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 131 - Number 5
Year of Publication: 2015
Authors: Kapil Kumar, Anurag Jain
10.5120/ijca2015907350

Kapil Kumar, Anurag Jain . Trust Enhancing Model for Cloud Environment. International Journal of Computer Applications. 131, 5 ( December 2015), 36-40. DOI=10.5120/ijca2015907350

@article{ 10.5120/ijca2015907350,
author = { Kapil Kumar, Anurag Jain },
title = { Trust Enhancing Model for Cloud Environment },
journal = { International Journal of Computer Applications },
issue_date = { December 2015 },
volume = { 131 },
number = { 5 },
month = { December },
year = { 2015 },
issn = { 0975-8887 },
pages = { 36-40 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume131/number5/23447-2015907350/ },
doi = { 10.5120/ijca2015907350 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:26:28.940835+05:30
%A Kapil Kumar
%A Anurag Jain
%T Trust Enhancing Model for Cloud Environment
%J International Journal of Computer Applications
%@ 0975-8887
%V 131
%N 5
%P 36-40
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is a technology in which data can be stored and access at remote server without the installation of software as well as hardware being installed at client side. The quick growth in field of “cloud computing” has also increased data security concerns. Security is a constant issue for open systems and internet. When we are thinking about security, cloud really suffers a lot. Lack of security is the biggest hurdle in wide adoption of cloud computing. The weakness in user’s authentication process, integrity and lack of effective security policy in cloud storage leads to many challenges in cloud computing. This paper proposes a scheme to securely store and access of data via internet. Authors have proposed a double encryption scheme that not only provides security of user’s private data during storage and access over the cloud but also provides the authentication feature using Elliptic curve cryptography.

References
  1. Mell, P. and Grance, T. (2009), “The NIST Definition of Cloud computing”, National Institute of Standards and Technology, vol. 53, no. 6.
  2. Ghobadi, A., Karimi, R., Heidari, F. and Samadi, M. (2014), "Cloud computing, reliability and security issue," 16th International Conference on Advanced Communication Technology (ICACT), pp. 504-511.
  3. Surv, N., Wanve, B., Kamble, R., Patil, S. and Katti, J. (2015), "Framework for client side AES encryption technique in cloud computing", 2015 IEEE International Conference on Advance Computing Conference (IACC), pp. 525-528.
  4. Rewagad, P. and Pawar, Y. (2013), "Use of Digital Signature with Diffie Hellman Key Exchange and AES Encryption Algorithm to Enhance Data Security in Cloud Computing", International Conference on Communication Systems and Network Technologies (CSNT), pp. 437-439.
  5. Kaur, R. and Singh, R. P. (2014), "Enhanced cloud computing security and integrity verification via novel encryption techniques", International Conference on Advances in Computing Communications and Informatics (ICACCI), pp. 1227-1233.
  6. Shimbre, N. and Deshpande, P. (2015), "Enhancing Distributed Data Storage Security for Cloud Computing Using TPA and AES Algorithm", International Conference on Computing Communication Control and Automation (ICCUBEA), pp. 35-39.
  7. Yin, X. C., Liu, Z. G. and Lee, H. J. (2014), "An efficient and secured data storage scheme in cloud computing using ECC-based PKI", International Conference on Advanced Communication Technology (ICACT), pp. 523-527.
  8. Chakraborty, T. K., Dhami, A., Bansal, P. and Singh, T. (2013), "Enhanced public auditability & secure data storage in cloud computing", IEEE 3rd International Conference on Advance Computing Conference (IACC), pp. 101-105.
  9. Singh, S. and Kumar, V. (2015), "Secured user's authentication and private data storage- access scheme in cloud computing using Elliptic curve cryptography", 2nd International Conference on Computing for Sustainable Global Development (INDIACom), pp. 791-795.
  10. Prodanovi, R., and Simi, D. (2007),” A Survey of Wireless Security”, Journal of Computing and Information Technology – CIT, pp. 237–255.
  11. Kumar, U., and Gambhir, S. (2014), “A Literature Review of Security Threats to Wireless Networks”, International Journal of Future Generation Communication and Networking, Vol. 7, No. 4, pp. 25-30
  12. Djenouri, D., Khelladi, L. and Badache, A. N., "A survey of security issues in mobile ad hoc and sensor networks", Communications Surveys & Tutorials, IEEE, vol. 7, no. 4, pp. 2-28.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing AES ECC HmailServer OTP.