scholarly journals An Efficient Approach for Secured E-Health Cloud System Using Identity Based Cryptography Techniques in Cloud Computing Environment

Author(s):  
Shikha Mittal
2013 ◽  
Vol 756-759 ◽  
pp. 837-840 ◽  
Author(s):  
Sheng Chang Guo ◽  
Yi Liu ◽  
Jie Ling

This paper draws on the principle of identity-based public key encryption (IBE) system algorithm. A suitable Identity authentication scheme for cloud computing environment is proposed. Security analysis of the scheme is given. The proposed scheme using the bidirectional signature between Client and cloud server has solved the safety verification audit, and realized identity authentication in cloud computing. We provide end-to-end authentication instead of trusted third party, which solve the problem of Key Escrow and improve the efficiency of the management of the identity authentication.


2019 ◽  
Vol 23 (24) ◽  
pp. 13127-13138 ◽  
Author(s):  
Chandrashekhar Meshram ◽  
Cheng-Chi Lee ◽  
Sarita Gajbhiye Meshram ◽  
Muhammad Khurram Khan

Author(s):  
Y.P. Klots ◽  
I.V. Muliar ◽  
V.M. Cheshun ◽  
O.V. Burdyug

In the article the urgency of the problem of granting access to services of distributed cloud system is disclosed, in particular, the peer distributed cloud system is characterized. The process of interaction of the main components is provided to access the domain name web resource. It is researched that the distribution of resources between nodes of a peer distributed cloud system with the subsequent provision of services on request is implemented using the Kademlia protocol on a local network or Internet and contains processes for publishing the resource at the initial stage of its owner, replication and directly providing access to resources. Application of modern technologies of adaptive information security systems does not allow full control over the information flows of the cloud computing environment, since they function at the upper levels of the hierarchy. Therefore, to create effective mechanisms for protecting software in a cloud computing environment, it is necessary to develop new threat models and to create methods for displaying computer attacks that allow operatively to identify hidden and potentially dangerous processes of information interaction. Rules of access form the basis of security policy and include restrictions on the mechanisms of initialization processes access. Under the developed operations model, the formalized description of hidden threats is reduced to the emergence of context-dependent transitions in the multigraph transactions. The method of granting access to the services of the distributed cloud system is substantiated. It is determined that the Distributed Hash Table (DHT) infrastructure is used to find a replication node that has a replica of the requested resource or part of it. The study identified the stages of identification of the node's validation. The process of adding a new node, validating authenticity, publishing a resource, and accessing a resource is described in the form of a step-by-step sequence of actions within the framework of the method of granting access to services of a distributed cloud system by graphical description of information flows, interaction of processes of information and objects processing.


Sign in / Sign up

Export Citation Format

Share Document