CFP last date
20 January 2025
Reseach Article

A Newer Secure Communication, File Encryption and User Identification based Cloud Security Architecture

by Tonny Shekha Kar, M. A. Parvez Mahmud, Shahjadi Hisan Farjana, Kawser Wazed Nafi, Bikash Chandra Karmokar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 52 - Number 4
Year of Publication: 2012
Authors: Tonny Shekha Kar, M. A. Parvez Mahmud, Shahjadi Hisan Farjana, Kawser Wazed Nafi, Bikash Chandra Karmokar
10.5120/8191-1560

Tonny Shekha Kar, M. A. Parvez Mahmud, Shahjadi Hisan Farjana, Kawser Wazed Nafi, Bikash Chandra Karmokar . A Newer Secure Communication, File Encryption and User Identification based Cloud Security Architecture. International Journal of Computer Applications. 52, 4 ( August 2012), 14-30. DOI=10.5120/8191-1560

@article{ 10.5120/8191-1560,
author = { Tonny Shekha Kar, M. A. Parvez Mahmud, Shahjadi Hisan Farjana, Kawser Wazed Nafi, Bikash Chandra Karmokar },
title = { A Newer Secure Communication, File Encryption and User Identification based Cloud Security Architecture },
journal = { International Journal of Computer Applications },
issue_date = { August 2012 },
volume = { 52 },
number = { 4 },
month = { August },
year = { 2012 },
issn = { 0975-8887 },
pages = { 14-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume52/number4/8191-1560/ },
doi = { 10.5120/8191-1560 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:51:25.292083+05:30
%A Tonny Shekha Kar
%A M. A. Parvez Mahmud
%A Shahjadi Hisan Farjana
%A Kawser Wazed Nafi
%A Bikash Chandra Karmokar
%T A Newer Secure Communication, File Encryption and User Identification based Cloud Security Architecture
%J International Journal of Computer Applications
%@ 0975-8887
%V 52
%N 4
%P 14-30
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing platform gives people the opportunity for sharing resources, services and information among the people of the whole world. In private cloud system, information is shared among the persons who are in that cloud. Because of this, different security related problems have grown in this platform. This paper work has proposed newer security architecture for cloud computing platform, which ensures secured communication system and hiding information from others. DES based file encryption system and asynchronous key system for exchanging information or data is included in this model. This structure is easily applicable with main cloud computing features, e. g. PaaS, SaaS and IaaS. This model also includes unique encryption key for user authentication process. El Gamal has been proposed in this paper for secured communication between users and cloud storage system. This paper work mainly deals with providing security for files stored in cloud computing archtecture.

References
  1. Yashpal Kadam, "Security Issues in Cloud Computing A Transparent View", International Journal of Computer Science Emerging Technology, Vol-2 No 5 October, 2011 , 316-322
  2. Rohit Bhadauria, Rituparna Chaki, Nabendu Chaki, Sugata Sanyal, "A Survey on Security Issues in Cloud Computing", 2011
  3. Mladen A. Vouk, "Cloud Computing – Issues, Research and Implementations", Journal of Computing and Information Technology - CIT 16, 2008, 4, 235–246
  4. Ye Hu, Johnny Wong, Gabriel Iszlai, Marin Litoiu, "Resource Provisioning for Cloud Computing", IBM Canada Ltd. , 2009
  5. Daniele Catteddu, Giles Hogben, "Cloud Computing:- Benefits, risks and recommendations for information security", November, 2009
  6. "Cloud Computing: Silver Lining or Storm Ahead?", Volume 13 Number 2, Spring 2010
  7. NGONGANG GUY MOLLET, "CLOUD COMPUTING SECURITY" , Thesis Paper, April 11, 2011
  8. Gunasekar Kumar, Anirudh Chelikani, "Analysis of security issues in cloud based e-learning", Master's thesis, 2011
  9. Jiyi Wu, Qianli Shen, Tong Wang, Ji Zhu, Jianlin Zhang "Recent Advances in Cloud Security", JOURNAL OF COMPUTERS, VOL. 6, NO. 10, OCTOBER 2011
  10. Ahmad-Reza Sadeghi, Thomas Schneider, and Marcel Winandy, "Token - Based Cloud Computing Secure Outsourcing of Data and Arbitrary Computations with Lower Latency", TRUST 2010, LNCS6101, pp . 417–429, 2010.
  11. Trusted Computing Group, "Solving the Data Security Dilemma with Self-Encrypting Drives", May 2010
  12. Hongwei Li, Yuanshun Dai, Ling Tian and Haomiao Yang, "Identity-Based Authentication for Cloud Computing", Cloud Com 2009, LNCS 5931, pp. 157–166, 2009
  13. Sven Bugiel, Stefan Nurnberger, Ahmad-Reza Sadeghi, Thomas Schneider, "Twin Clouds: Secure Cloud Computing with Low Latency", CASED, Germany, 2011
  14. Sven Bugiel, Stefan Nurnberger, Ahmad-Reza Sadeghi, Thomas Schneider, "Twin Clouds: Secure Cloud Computing with Low Latency"- Extended Abstract, CASED, Germany, 2011
  15. Luis M. Vaquero, Luis Rodero-Merino, Daniel Morán, "Locking the sky: a survey on IaaS cloud security", Computing (2011) 91:93–118
  16. Yang Tang, Patrick P. C. Lee, John C. S. Lui, and Radia Perlman, "FADE: Secure Overlay Cloud Storage with File Assured Deletion", 2010
  17. Neha Jain and Gurpreet Kaur, "Implementing DES Algorithm in Cloud for Data Security", VSRD-IJCSIT, Vol. 2 (4), 2012, pg: 316-321
  18. Thuy D. Nguyen, Mark A. Gondree, David J. Shifflett, Jean Khosalim, Timothy E. Levin, Cynthia E. Irvine, "A Cloud-Oriented Cross-Domain Security Architecture", The 2010 Military Communications Conference, U. S. Govt.
  19. Cong Wang, Qian Wang, and Kui Ren, Wenjing Lou, "Ensuring Data Storage Security in Cloud Computing", US National Science Foundation under grant CNS-0831963, CNS-0626601, CNS-0716306, and CNS-0831628, 2009
  20. Vaibhav Khadilkar, Anuj Gupta, Murat Kantarcioglu, Latifur Khan, Bhavani Thuraisingham, "Secure Data Storage and Retrieval in the Cloud", University of Texas, 2011
  21. John Harauz, Lori M. Kaufman, Bruce Potter, "data Security in the World of Cloud Computing", The IEEE Computer SOCIETIES, August, 2009
  22. Kevin Hamlen, Murat Kantarcioglu, Latifur Khan, Bhavani Thuraisingham, "Security Issues for cloud computing", International Journal of Information Security and Privacy, 4(2), 39-51, April-June 2010
  23. Taher ElGamal, "A public key cryptosystem and a signature scheme based discrete logarithms", HP labs, 1985.
  24. AndreasV. Meier, "The ElGamal Cryptosystem", 2005.
  25. Melissa Helgeson, "Security and Applications of ElGamal's Encryption Algorithm", Google Scholar,
  26. Raymond G. Kammer, William M. Daley, "DATA ENCRYPTION STANDARD (DES)", FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION, FIPS PUB 46-3, 1999
  27. Marco Bodrato, "Public key cryptography. ElGamal, hints on implementation", Tokyo University of Science - March 18th, 2008
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Security architecture DES El Gamal Cryptosystem