scholarly journals STE-AMM: Secret Twist Encryption Standard Access Mechanism Model in Cloud Environment

2021 ◽  
pp. 111-117
Author(s):  
Sameer Sameer ◽  
◽  
Harish Rohil

The advent of the cloud computing has provided the opportunity for various organizations and enterprises to store the data effectively at low cost. With the advancement, the cloud environment manages to have mutli-users to access the data in the cloud based on their request. The requests and the activities of users are monitored and controlled by the group manager based on the roles of them. However due to the dynamic nature of the multi -user clouds result in challenges for ensuring the security of the cloud. Additionally, the revocation of existing users often results in increased overheads. A novel framework of Secret Twisted Encryption based access mechanism model (STE-AMM) is proposed to resolve these issues with two modules. The Square Decisional Diffie-Hellman (SDDH) technique is employed to generate the digital signature for users and used to govern the user in group module. The secret keys to secure the data is generated with the STE algorithm which is the improved Advanced Encryption Standard (AES) and used in the data module. The proposed STE-AMM framework is implemented and evaluated with the metrics of time and cost. The obtained results showed that the performance of the proposed framework is effective than the existing models for securing the data in the cloud. The proposed framework may be enhanced with random size for signature and security key.

2018 ◽  
Vol 10 (3) ◽  
pp. 42-60 ◽  
Author(s):  
Sahar A. El-Rahman ◽  
Daniyah Aldawsari ◽  
Mona Aldosari ◽  
Omaimah Alrashed ◽  
Ghadeer Alsubaie

IoT (Internet of Things) is regarded as a diversified science and utilization with uncommon risks and opportunities of business. So, in this article, a digital signature mobile application (SignOn) is presented where, it provides a cloud based digital signature with a high security to sustain with the growth of IoT and the speed of the life. Different algorithms were utilized to accomplish the integrity of the documents, authenticate users with their unique signatures, and encrypt their documents in order to provide the best adopted solution for cloud-based signature in the field of IoT. Where, ECDSA (Elliptic Curve Digital Signature Algorithm) is utilized to ensure the message source, Hash function (SHA-512) is used to detect all information variations, and AES (Advanced Encryption Standard) is utilized for more security. SignOn is considered as a legal obligated way of signing contracts and documents, keeping the data in electronic form in a secure cloud environment and shortens the duration of the signing process. Whereas, it allows the user to sign electronic documents and then, the verifier can validate the produced signature.


Information ◽  
2020 ◽  
Vol 11 (8) ◽  
pp. 382
Author(s):  
Sonali Chandel ◽  
Geng Yang ◽  
Sumit Chakravarty

Cloud has become one of the most widely used technologies to store data due to its availability, flexibility, and low cost. At the same time, the security, integrity, and privacy of data that needs to be stored on the cloud is the primary threat for cloud deployment. However, the increase in cloud utilization often results in the creation of a multi-user cloud environment, which requires its owners to manage and monitor the data more effectively. The security of information faces an additional threat, which is related to the increasing number of users and owners who deal with the data stored on the cloud. Many researchers have developed several frameworks and algorithms to address the security issues of the cloud environment. In the present work, a novel algorithm is proposed with the integration of Ciphertext Policy-Identity Attribute-based Encryption (CP-IDABE) and the Rivest–Shamir–Adelman (RSA) algorithm for securing the cloud. Both the owners and users are provided with the public and distinct secret keys that are generated by the Automated Certificate Authority (ACA). The attribute policy differentiates between the user and owner for accessing the cloud data. The proposed RSA-CP-IDABE algorithm also prevents the Man in the Middle (MITM) attack effectively. The performance of the proposed algorithm is evaluated for its time used for encryption, decryption, and execution for varying sizes of data. The obtained results are compared with the existing framework to show its effectiveness. The proposed algorithm can be enhanced with the revocation of privileges in the future.


2018 ◽  
Vol 10 (3) ◽  
pp. 61-83 ◽  
Author(s):  
Deepali Chaudhary ◽  
Kriti Bhushan ◽  
B.B. Gupta

This article describes how cloud computing has emerged as a strong competitor against traditional IT platforms by offering low-cost and “pay-as-you-go” computing potential and on-demand provisioning of services. Governments, as well as organizations, have migrated their entire or most of the IT infrastructure to the cloud. With the emergence of IoT devices and big data, the amount of data forwarded to the cloud has increased to a huge extent. Therefore, the paradigm of cloud computing is no longer sufficient. Furthermore, with the growth of demand for IoT solutions in organizations, it has become essential to process data quickly, substantially and on-site. Hence, Fog computing is introduced to overcome these drawbacks of cloud computing by bringing intelligence to the edge of the network using smart devices. One major security issue related to the cloud is the DDoS attack. This article discusses in detail about the DDoS attack, cloud computing, fog computing, how DDoS affect cloud environment and how fog computing can be used in a cloud environment to solve a variety of problems.


Author(s):  
Bharat Shah

Recent years have seen the rapid growth of on-demand, flexible, low-cost cloud-based information technology services. Government and business organizations around the world have started transforming their traditional in-house data center environments to cloud-based outsourced data centers. This transformation is opening doors to new risks given that the cloud computing delivery models, related services, and technologies are still maturing and evolving. Before deployment, organizations must implement cloud environment assessment methodologies to comply with the applicable standards and regulations. They must evaluate the environment’s quality attributes of Internet connectivity, user access control, privacy and confidentiality, asset protection, multiple platforms locality, availability, reliability, performance, and scalability. The purpose of this chapter is to assist organizations that are considering providing and consuming cloud-based services in developing an assessment plan specific to organizational policies, strategies and their business and applicable legal and regulatory requirements; and assessing the cloud environment controls for infrastructure, platform, and software services.


2019 ◽  
Vol 38 (12-13) ◽  
pp. 1442-1462 ◽  
Author(s):  
Zakary Littlefield ◽  
David Surovik ◽  
Massimo Vespignani ◽  
Jonathan Bruce ◽  
Weifu Wang ◽  
...  

Tensegrity-based robots can achieve locomotion through shape deformation and compliance. They are highly adaptable to their surroundings, and are lightweight, low cost, and physically robust. Their high dimensionality and strongly dynamic nature, however, can complicate motion planning. Efforts to date have primarily considered quasi-static reconfiguration and short-term dynamic motion of tensegrity robots, which do not fully exploit the underlying system dynamics in the long term. Longer-horizon planning has previously required costly search over the full space of valid control inputs. This work synthesizes new and existing approaches to produce dynamic long-term motion while balancing the computational demand. A numerical process based upon quasi-static assumptions is first applied to deform the system into an unstable configuration, causing forward motion. The dynamical characteristics of the result are then altered via a few simple parameters to produce a small but diverse set of useful behaviors. The proposed approach takes advantage of identified symmetries on the prototypical spherical tensegrity robot, which reduce the number of needed gaits but allow motion along different directions. These gaits are first combined with a standard search method to achieve long-term planning in environments where the developed gaits are effective. For more complex environments, the various motion primitives are paired with the fall-back option of random valid actions and are used by an informed sampling-based kinodynamic motion planner with anytime properties. Evaluations using a physics-based model for the prototypical robot demonstrate that modest but efficiently applied search effort can unlock the utility of dynamic tensegrity motion to produce high-quality solutions.


Author(s):  
Vishal Passricha ◽  
Ashish Chopra ◽  
Shubhanshi Singhal

Cloud storage (CS) is gaining much popularity nowadays because it offers low-cost and convenient network storage services. In this big data era, the explosive growth in digital data moves the users towards CS but this causes a lot of storage pressure on CS systems because a large volume of this data is redundant. Data deduplication is an effective data reduction technique. The dynamic nature of data makes security and ownership of data as a very important issue. Proof-of-ownership schemes are a robust way to check the ownership claimed by any owner. However, this method affects the deduplication process because encryption methods have varying characteristics. A convergent encryption (CE) scheme is widely used for secure data deduplication. The problem with the CE-based scheme is that the user can decrypt the cloud data while he has lost his ownership. This article addresses the problem of ownership revocation by proposing a secure deduplication scheme for encrypted data. The proposed scheme enhances the security against unauthorized encryption and poison attack on the predicted set of data.


Author(s):  
Henny Indriyawati ◽  
Titin Winarti ◽  
Vensy Vydia

<span>Web-based degree document certification system with a digital signature in Semarang University has a purpose to support academic to do online document certification through a system. The main problem which occurs in academic administration is a long document certification process that causes an ineffective and inefficient certification process. To solve the problem, a system that can encrypt a document for better security is required. This system is built with the advanced encryption standard algorithm with a 128-bit sized key to encrypt confidential information inside the document. During the encryption process, this algorithm operates using 4x4 bit array blocks and passing many encryption processes for at least 10 (ten) times. The application is analyzed with object-oriented analysis and modeled with Unified modeling language. The result of this research is a system which can secure document with AES algorithm with a 256-bit sized key. The security element in this algorithm will make easier to identify the owner of the document. The secured document is easily accessible through PHP-based web or available QR code. When decrypting the document, the application will activate the camera function and decrypt the information document.</span>


Sign in / Sign up

Export Citation Format

Share Document