Achieving Cloud Security using Third Party Auditor, MD5 and Identity-Based Encryption

被引:0
|
作者
Gajendra, Bhale Pradeepkumar [1 ]
Singh, Vinay Kumar [2 ,3 ]
Sujeet, More [2 ,3 ]
机构
[1] Natl Inst Technol Jalandhar, Dept Comp Sci & Engn, Jalandhar 144011, Punjab, India
[2] Indian Inst Technol Delhi, Delhi, India
[3] Jawaharlal Nehru Engn Coll, Aurangabad, Maharashtra, India
关键词
Cloud computing; Third Party Auditor; Identity Based Encryption; RSA; MD5;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, Cloud computing has enjoyed a tremendous rise in popularity. It provides facilities for users to use cloud applications or platform without the need of any software installation and access the data or application from anywhere, with the help of internet. The cloud computing is divided into three fragments: Application, Service and Platform. Each of fragment provides different cloud services for business and individuals. Many organizations use this cloud service without any software, they run all their applications on the cloud and use on demand services. In Cloud, consumers, store their personal files or data on cloud server and consumers use that data or files whenever needed. Many consumers store or place their personal data on the cloud, so security and privacy are very important issue in cloud. These two issues can lead to a number of security concerns related to data transmission, integrity control, access control, identity management, logging and auditing, etc. Yet, research in the area of cloud computing receiving great attention from industry, academia and government. Since these domains have numerous complex issues, there are multiple open problems for research and opportunities for making noteworthy contributions, one of these issues is the data transmission in cloud computing. This proposal is concerned to overcome the security trade-off and improve the performance of data transmission and increase the security through Third Party Auditor and Identity Based Encryption.
引用
收藏
页码:1304 / 1309
页数:6
相关论文
共 50 条
  • [1] A Novel Technique of Cloud Security Based on Hybrid Encryption by Blowfish and MD5
    Chauhan, Adviti
    Gupta, Jyoti
    [J]. PROCEEDINGS OF 4TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMPUTING AND CONTROL (ISPCC 2K17), 2017, : 349 - 355
  • [2] Achieving Cloud Security Using a Third Party Auditor and Preserving Privacy for Shared Data Over a Public Cloud
    Gutte, Vitthal Sadashiv
    Devulapalli, Sita
    [J]. INTERNATIONAL JOURNAL OF KNOWLEDGE AND SYSTEMS SCIENCE, 2020, 11 (01) : 77 - 95
  • [3] Encryption and Decryption using Password Based Encryption, MD5, and DES
    Dhany, Hanna Willa
    Izhari, Fahmi
    Fahmi, Hasanul
    Tulus
    Sutarman
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PUBLIC POLICY, SOCIAL COMPUTING AND DEVELOPMENT 2017 (ICOPOSDEV 2017), 2017, 141 : 293 - 298
  • [4] Research on System Login Security Encryption Method Based on MD5
    Zhang, Xi-mei
    Li, Ying
    Cao, Yi-Zhen
    Li, Yan-fang
    [J]. INTERNATIONAL CONFERENCE ON CONTROL AND AUTOMATION (ICCA 2016), 2016, : 513 - 518
  • [5] Identity-Based Encryption with Forward Security
    Li, Hongwei
    Yang, Haomiao
    Li, Fan
    [J]. 2009 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLUMES I & II: COMMUNICATIONS, NETWORKS AND SIGNAL PROCESSING, VOL I/ELECTRONIC DEVICES, CIRUITS AND SYSTEMS, VOL II, 2009, : 287 - 290
  • [6] A NOVEL SECURITY MODEL FOR CLOUD USING TRUSTED THIRD PARTY ENCRYPTION
    Thamizhselvan, M.
    Raghuraman, R.
    Manoj, S. Gershon
    Paul, P. Victer
    [J]. 2015 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2015,
  • [7] Hybrid Cloud Security by Revocable KUNodes-Storage with Identity-Based Encryption
    Saravanakumar, S.
    Chitra, S.
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 43 (03): : 985 - 996
  • [8] Data Security and Privacy Assurance for Cloud Computing in Education Based on a Third Party Auditor
    Alim, Endy Sjaiful
    Jin, Hai
    [J]. BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2019, 124 : 96 - 97
  • [9] Circular and KDM Security for Identity-Based Encryption
    Alperin-Sheriff, Jacob
    Peikert, Chris
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2012, 2012, 7293 : 334 - 352
  • [10] On the security of encryption modes of MD4, MD5 and HAVAL (Extended abstract)
    Kim, J
    Biryukov, A
    Preneel, B
    Lee, S
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2005, 3783 : 147 - 158