Secured Cloud Computing using User Classification and Bilinear Diffie-Hellman Schema

被引:0
|
作者
Kalpana, G. [1 ]
Kumar, P. V. [2 ]
Krishnaiah, R. V. [3 ]
机构
[1] JNTUH, Dept Comp Sci & Engn, Hyderabad, Andhra Pradesh, India
[2] Osmania Univ, Dept Comp Sci & Engn, Hyderabad, Andhra Pradesh, India
[3] Inst Aeronaut Engn, Dept Comp Sci & Engn, Hyderabad, Andhra Pradesh, India
关键词
Pool; DBA; BDDH; BCDH; Cryptography; Virtual Machine; Physical Machine;
D O I
10.1109/IACC.2016.110
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the present computer era of cloud computing and its security issues pertaining identification and restricting malicious users or unknown users is considered to be critical as they tend to hack or attack cloud tenant's bilinear data. The proposed work protects data pertaining seller, retailer and carrier from attacker by classifying various cloud users. Bilinear Computational Diffie-Hellman (BCDH) and Bilinear Decisional Diffie Hellman (BDDH) are used to implement Analytical Cloud Model. The classification is performed based on classification of working of processing time at Virtual Machine VM and Physical Machine PM based on their threshold values calculated based on the life time of the arrival job in Instance Allocation Pool Access Tree.
引用
收藏
页码:563 / 568
页数:6
相关论文
共 50 条
  • [1] Secure bilinear Diffie-Hellman bits
    Galbraith, SD
    Hopkins, HJ
    Shparlinski, IE
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2004, 3108 : 370 - 378
  • [2] Polynomial approximation of bilinear Diffie-Hellman maps
    Blake, Ian F.
    Garefalakis, Theo
    [J]. FINITE FIELDS AND THEIR APPLICATIONS, 2008, 14 (02) : 379 - 389
  • [3] The Twin Bilinear Diffie-Hellman Inversion Problem and Applications
    Chen, Yu
    Chen, Liqun
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2010, 2011, 6829 : 113 - +
  • [4] Anonymous fingerprinting as secure as the bilinear Diffie-Hellman assumption
    Kim, M
    Kim, J
    Kim, K
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2002, 2513 : 97 - 108
  • [5] A KEY MANAGEMENT SCHEME FOR SENSOR NETWORKS USING BILINEAR PAIRINGS AND GAP DIFFIE-HELLMAN GROUP
    Lin, Iuon-Chang
    Chang, Pen-Yi
    Chang, Chin-Chen
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2010, 6 (02): : 809 - 816
  • [6] Efficiency Optimisation Of Tor Using Diffie-Hellman Chain
    Peng, Kun
    [J]. PROCEEDINGS OF THE TENTH INTERNATIONAL CONFERENCE ON NETWORKS (ICN 2011), 2011, : 41 - 46
  • [7] Using ProVerif to Analyze Protocols with Diffie-Hellman Exponentiation
    Kuesters, Ralf
    Truderung, Tomasz
    [J]. PROCEEDINGS OF THE 22ND IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, 2009, : 157 - 171
  • [8] A Quantum Diffie-Hellman Protocol Using Commuting Transformations
    Subramaniam, Pranav
    Parakh, Abhishek
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNCATIONS SYSTEMS (ANTS), 2014,
  • [9] Elliptic curve Diffie-Hellman cryptosystem in big data cloud security
    Subramanian, E. K.
    Tamilselvan, Latha
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (04): : 3057 - 3067
  • [10] The relationship between breaking the Diffie-Hellman protocol and computing discrete logarithms
    Maurer, UM
    Wolf, S
    [J]. SIAM JOURNAL ON COMPUTING, 1999, 28 (05) : 1689 - 1721