Cloud Security Architecture Based on User Authentication and Symmetric Key Cryptographic Techniques

被引:0
|
作者
Wani, Abdul Raoof [1 ]
Rana, Q. P. [2 ]
Pandey, Nitin [1 ]
机构
[1] Amity Univ Noida, Noida, Uttar Pradesh, India
[2] Jamia Hamdard, New Delhi, India
关键词
AES; SHA3; Blowfish; Cloud Security Architecture; Cloud computing;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud computing environment gives people to share resources, services and information. This environment is adopted by large number of organizations, so the rapid transition towards the cloud has fuelled concerns on security perspective. Encryption algorithms play main role in solving such kind of problems in the cloud computing environment. This paper proposes the structure for cloud security with efficient security in communication system and AES based file encryption system. This security architecture can be easily applied on PaaS, IaaS and SaaS and one time password provides extra security in the authenticating users. This paper presents the security of whole cloud computing environment.
引用
下载
收藏
页码:529 / 534
页数:6
相关论文
共 50 条
  • [1] A Security Architecture Based on User Authentication of Bluetooth
    Xin, Yu
    Ting, Yan
    2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 3, PROCEEDINGS, 2009, : 627 - +
  • [2] A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing security architecture
    Nafi, Kawser Wazed
    Kar, Tonny Shekha
    Hoque, Sayed Anisul
    Hashem, M. M. A.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2012, 3 (10) : 181 - 186
  • [3] Security Enhanced Anonymous Remote User Authentication and Key Agreement for Cloud Computing
    Dong, Zheming
    Zhang, Lei
    Li, Jiangtao
    2014 IEEE 17th International Conference on Computational Science and Engineering (CSE), 2014, : 1746 - 1751
  • [4] Classical and Physical Security of Symmetric Key Cryptographic Algorithms
    Baksi, Anubhab
    PROCEEDINGS OF THE 2021 IFIP/IEEE INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION (VLSI-SOC), 2021, : 186 - 187
  • [5] On the round security of symmetric-key cryptographic primitives
    Ramzan, Z
    Reyzin, L
    ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 376 - 393
  • [6] MOBILE-BASED CONTINUOUS USER AUTHENTICATION SYSTEM FOR CLOUD SECURITY
    Li, Qing
    Wang, Le
    Kim, TaeGuen
    Im, Eul Gyu
    PROCEEDINGS OF 2016 5TH IEEE INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT (IEEE IC-NIDC 2016), 2016, : 176 - 179
  • [7] Symmetric Key-Based Lightweight Authentication Protocols for RFID Security
    Rajaguru, K.
    Hansdah, R. C.
    2018 32ND INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2018, : 488 - 495
  • [8] A symmetric neural cryptographic key generation scheme for Iot security
    Sarkar, Arindam
    APPLIED INTELLIGENCE, 2023, 53 (08) : 9344 - 9367
  • [9] A Generic Security API for Symmetric Key Management on Cryptographic Devices
    Cortier, Veronique
    Steel, Graham
    COMPUTER SECURITY - ESORICS 2009, PROCEEDINGS, 2009, 5789 : 605 - +
  • [10] A symmetric neural cryptographic key generation scheme for Iot security
    Arindam Sarkar
    Applied Intelligence, 2023, 53 : 9344 - 9367