scholarly journals Automated SSH Key Management Using Custom Certificate Authority and Temporary Keys

Author(s):  
Kartik Behl, Amita Goel , Vasudha Bahl and Nidhi Sengar

In this era of massive knowledge, cloud computing has emerged as one of the most on-demand accessibility of computing system resources, a plan that modified the ways of computing. However, data security remains a tangle in creating cloud computing vulnerable. Therefore, SSH users and businesses victimization SSH coding should do everything necessary to shield the safety of their SSH encryption keys and different components so as to uphold the trust placed within the system. SSH keys automate the manner of stable get admission to servers, bypassing the want to manually input log-in credentials. SSH is likewise immune to brute pressure assaults and protects against sure assault vectors getting used to advantage get admission to far off machines. The current research work carries out a detailed functioning of a publicly available, fully managed and automated solution for secure management and distribution of SSH keys with a granular level access control which will prevent any potential leak of a private key.

Presently usage of smart mobiles increasing, due to internet availability most of users outsourcing their data to cloud but it is untrusted, so a security mechanism needed in this work proposing Homomorphic cipher text policy-Attribute based encryption (HCP-ABE), it derived from classic ABE. “Mobile cloud computing are combinations of mobile computing and cloud computing”, mobile applications are designed and hosted in cloud computing without verifying about mobile environment. Security models are constructed using Perturbation methods as per literature. These models are not secure compared to cryptographic techniques. When perturbation methods are used, Data reconstruction becomes a significant challenge. Hence computations are complicated to perform. Furthermore, this method suffers a trade-off between accuracy and privacy and most of the research work focused on key management issues and static access policies but due to user dynamic the access control mechanism should design for proactive strategies. To support dynamic access control and operations HCP-ABE scheme intended. In this paper we identify challenges associated with mobile cloud-based security system and possible provide solutions to understand existing research work conducting compressive review on different access control mechanisms.


Author(s):  
Vaishali Ravindra Thakare ◽  
K. John Singh

Cloud computing is a new environment in computer-oriented services. The high costs of network platforms, development in client requirements, data volumes and weight on response time pushed companies to migrate to cloud computing, providing on-demand web facilitated IT services. Cloud storage empowers users to remotely store their information and delight in the on-demand high quality cloud applications without the affliction of local hardware management and programming administration. In order to solve the problem of data security in cloud computing system, by introducing fully homomorphism encryption algorithm in the cloud computing data security, another sort of information security solution to the insecurity of the cloud computing is proposed, and the scenarios of this application is hereafter constructed. This new security arrangement is completely fit for the processing and retrieval of the encrypted data, successfully prompting the wide relevant prospect, the security of data transmission, and the stockpiling of the cloud computing.


Author(s):  
Hicham Amellal ◽  
Abdelmajid Meslouhi ◽  
Abderahim El Allati ◽  
Annas El Haddadi

With the advancement of communication and information technology, the internet has become used as a platform for computing and not only a way of communications networks. Accordingly, the large spread of cloud computing led to the emergence of different privacy implications and data security complexities. In order to enhance data security in the cloud, the authors propose in this chapter the use of an encryption box, which includes different cryptosystems. In fact, this step gives the user the opportunities to encrypt data with an unknown algorithm and makes a private key before the storage of data in the host company servers. Moreover, to manage the encryption database, the authors propose a quantum approach in search based on Grover's algorithm.


Author(s):  
Navin Jambhekar ◽  
Chitra Anil Dhawale

Information security is a prime goal for every individual and organization. The travelling from client to cloud server can be prone to security issues. The big data storages are available through cloud computing system to facilitate mobile client. The information security can be provided to mobile client and cloud technology with the help of integrated parallel and distributed encryption and decryption mechanism. The traditional technologies include the plaintext stored across cloud and can be prone to security issues. The solution provided by applying the encrypted data upload and encrypted search. The clouds can work in collaboration; therefore, the encryption can also be done in collaboration. Some part of encryption handle by client and other part handled by cloud system. This chapter presents the security scenario of different security algorithms and the concept of mobile and cloud computing. This chapter precisely defines the security features of existing cloud and big data system and provides the new framework that helps to improve the data security over cloud computing and big data security system.


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Xiaodan Chen ◽  
Desheng Zeng ◽  
Shuanglong Pang ◽  
Fu Jun

In order to improve data security, ensure user privacy, and solve the problems of low data access control accuracy, long time consumption, and high energy consumption in traditional methods, a cloud computing storage data access control method based on dynamic re-encryption is proposed. The principal component analysis method is used to reduce the dimension of the cloud computing storage data, and the random forest algorithm is further used to classify and process the cloud computing storage data according to the processing results. On the basis of data preprocessing, an access control tree is established to obtain the correlation of data nodes. Finally, the dynamic re-encryption method is used for data security state transformation, and the data access control of cloud computing storage is realized through key generation, encryption, re-encryption key generation, and decryption. The experimental results show that the data access control accuracy of the method in this paper is high, time consumption is small, and energy consumption is small, and it is more suitable for cloud computing systems with huge data and information.


Author(s):  
Abdul Razaque ◽  
Shaldanbayeva Nazerke ◽  
Bandar Alotaibi ◽  
Munif Alotaibi ◽  
Akhmetov Murat ◽  
...  

Nowadays, cloud computing is one of the important and rapidly growing paradigms that extend its capabilities and applications in various areas of life. The cloud computing system challenges many security issues, such as scalability, integrity, confidentiality, and unauthorized access, etc. An illegitimate intruder may gain access to the sensitive cloud computing system and use the data for inappropriate purposes that may lead to losses in business or system damage. This paper proposes a hybrid unauthorized data handling (HUDH) scheme for Big data in cloud computing. The HUDU aims to restrict illegitimate users from accessing the cloud and data security provision. The proposed HUDH consists of three steps: data encryption, data access, and intrusion detection. HUDH involves three algorithms; Advanced Encryption Standards (AES) for encryption, Attribute-Based Access Control (ABAC) for data access control, and Hybrid Intrusion Detection (HID) for unauthorized access detection. The proposed scheme is implemented using Python and Java language. Testing results demonstrate that the HUDH can delegate computation overhead to powerful cloud servers. User confidentiality, access privilege, and user secret key accountability can be attained with more than 97% high accuracy.


2020 ◽  
Vol 10 (4) ◽  
pp. 13-27
Author(s):  
Ritu Bansal ◽  
Vikash Kumar Singh

This research work seeks to suggest the development of an efficient cloud computing system to show that the various forms of effective online learning for sustainable livelihoods for unemployed youth are accountable for and lead to a number of factors. In the scope of sustainable livelihoods for unemployed people, it also aims to recognize certain fields of data analysis and their interrelationship. One question seems to bubble to the surface more than any other in the authors' discussions with clients, friends, and peers: How does successful online learning for sustainable living for unemployed youth explain switching to the cloud? Cloud computing could allow more adequate performance of its own efficient distributed tools through the SaaS system; therefore, both design the cloud computing SaaS distribution framework for unemployed youth talent learning. This article proposes an efficient cloud computing system strategy for active online learning for unemployed youth sustainable livelihoods.


2014 ◽  
Vol 513-517 ◽  
pp. 2273-2276
Author(s):  
Shao Min Zhang ◽  
Jun Ran ◽  
Bao Yi Wang

Ciphertext-Policy Attribute-based encryption (CP-ABE) mechanism is an extension of attribute-based encryption which associates the ciphertext and user's private key with the attribute by taking the attribute as a public key. It makes the representation of the access control policy more flexible, thus greatly reduces the network bandwidth and processing overhead of sending node brought by fine-grained access control of data sharing. According to the principle of CP-ABE encryption mechanism for this mechanism, an improved cloud computing-based encryption algorithm was proposed in this paper to overcome the deficiencies of permission changing process under the massive data. Experimental results show that compared with traditional methods, the new mechanism significantly reduces time-consuming.


Sign in / Sign up

Export Citation Format

Share Document