Cloud Security Architecture Based on User Authentication and Symmetric Key Cryptographic Techniques

被引:0
|
作者
Wani, Abdul Raoof [1 ]
Rana, Q. P. [2 ]
Pandey, Nitin [1 ]
机构
[1] Amity Univ Noida, Noida, Uttar Pradesh, India
[2] Jamia Hamdard, New Delhi, India
关键词
AES; SHA3; Blowfish; Cloud Security Architecture; Cloud computing;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud computing environment gives people to share resources, services and information. This environment is adopted by large number of organizations, so the rapid transition towards the cloud has fuelled concerns on security perspective. Encryption algorithms play main role in solving such kind of problems in the cloud computing environment. This paper proposes the structure for cloud security with efficient security in communication system and AES based file encryption system. This security architecture can be easily applied on PaaS, IaaS and SaaS and one time password provides extra security in the authenticating users. This paper presents the security of whole cloud computing environment.
引用
下载
收藏
页码:529 / 534
页数:6
相关论文
共 50 条
  • [21] Spatial Cryptographic and Watermarking Technique for Authentication and Security of Medical Images in a Cloud Based Health Information Systems
    Kester, Quist-Aphetsi
    E-INFRASTRUCTURE AND E-SERVICES FOR DEVELOPING COUNTRIES (AFRICOMM 2016), 2018, 208 : 281 - 291
  • [22] A Mobile Terminal Authentication Scheme Based on Symmetric Cryptographic Mechanisms
    Li, Ying
    Zhao, Guifen
    Du, Liping
    Guo, Jianwei
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSAIT 2013), 2014, 255 : 131 - 137
  • [23] Management of Symmetric Cryptographic Keys in Cloud Based Environment
    Fakhar, Faiza
    Shibli, Muhammad Awais
    2013 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2013, : 39 - 44
  • [24] Research on Large-scale Authentication Architecture and Key Management Protocol Based on Combined Symmetric Key
    Liu Tong
    Jiang Jiya
    2009 INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2009), VOLUMES 1 AND 2, 2009, : 367 - 370
  • [25] Secure cloud storage based on cryptographic techniques
    Zhao, W. (zhaow@itsec.gov.cn), 1600, Beijing University of Posts and Telecommunications (19):
  • [26] SYMMETRIC KEY CRYPTOGRAPHIC ALGORITHM BASED ON LOGARITHMIC FUNCTION
    Nema, Preksha
    Rizvi, M. A.
    2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, : 757 - 762
  • [27] Research on Real-Name Identity Authentication Architecture Based on Combined Symmetric Key
    Liu Tong
    Jiang Jiya
    PROCEEDINGS OF 2009 CONFERENCE ON COMMUNICATION FACULTY, 2009, : 276 - 280
  • [28] Research on large-scale identity authentication architecture based on combined symmetric key
    Liu, Tong
    Xu, Guan-Ning
    Tongxin Xuebao/Journal on Communications, 2009, 30 (11 A): : 91 - 95
  • [29] Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud Software
    Dodis, Yevgeniy
    Luo, Weiliang
    Xu, Shouhuai
    Yung, Moti
    7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012), 2012,
  • [30] A Study of Security Impacts and Cryptographic Techniques in Cloud-based e-Learning Technologies
    Degambur, Lavanya-Nehan
    Armoogum, Sheeba
    Pudaruth, Sameerchand
    International Journal of Advanced Computer Science and Applications, 2022, 13 (01): : 58 - 66