scholarly journals Using Security Features for Cloud Computing Based on New Symmetric Key Algorithm

2016 ◽  
pp. 1-6 ◽  
Author(s):  
Saeed Q. Al-Khalidi Al-Maliki ◽  
Fahad Alfifi
2019 ◽  
Vol 2019 ◽  
pp. 1-13 ◽  
Author(s):  
Ping Wang ◽  
Bin Li ◽  
Hongjin Shi ◽  
Yaosheng Shen ◽  
Ding Wang

Investigating the security pitfalls of cryptographic protocols is crucial to understand how to improve security. At ICCCS’17, Wu and Xu proposed an efficient smart-card-based password authentication scheme for cloud computing environments to cope with the vulnerabilities in Jiang et al.’s scheme. However, we reveal that Wu-Xu’s scheme actually is subject to various security flaws, such as offline password guessing attack and replay attack. Besides security, user friendly is also another great concern. In 2017, Roy et al. found that in most previous two-factor schemes a user has to manage different credentials for different services and further suggested a user-friendly scheme which is claimed to be suitable for multiserver architecture and robust against various attacks. In this work, we show that Roy et al.’s scheme fails to achieve truly two-factor security and shows poor scalability. At FGCS’18, Amin et al. pointed out that most of existing two-factor schemes are either insecure or inefficient for mobile devices due to the use of public-key techniques and thus suggested an improved protocol by using only light-weight symmetric key techniques. Almost at the same time, Wei et al. also observed this issue and proposed a new scheme based on symmetric key techniques with formal security proofs in the random oracle model. Nevertheless, we point out that both Amin et al.’s and Wei et al.’s schemes cannot achieve the claimed security goals (including the most crucial goal of “truly two-factor security”). Our results invalidate any use of the scrutinized schemes for cloud computing environments.


2019 ◽  
Vol 8 (2) ◽  
pp. 1706-1710

The security parts of distributed computing, particularly the security of information, turn out to be increasingly essential. It is important to build up another component to verify the information in the cloud. Cryptographic based symmetric key cryptosystems helps to provide an efficient way to protect information. Enhanced symmetric key cryptosystem AES algorithm has been proposed for securing the data and safely storing to the cloud. This paper is to provide an overall security to the files which are in the cloud so the encrypted file can be retrieved at any time from the cloud. The paper also aims to introduce the mechanism use to secure cloud computing applications as well as to compare some existing algorithm like RSA and AES with an enhanced AES algorithm and to prove that the proposed algorithm is more effective than the other two algorithms. The encryption speed of the algorithms is graphically represented in the paper.


2019 ◽  
Author(s):  
Madhusudhana H. S.

Authentication is the first and foremost security principle that involves validation of identity of an user or a machine. The successful authentication is required for authorization and secure data exchanges. A common classification of authentication system based on factors – something you know, something you own, something you did and something you are – is explained. Well-known and used password schemes employed in practice is described along with standards. A description Kerberos of authentication system based on symmetric key encryption and SSL based authentication which is based on public key encryption is given. Related Single-Sign-On technologies are explained. A brief overview of authentication for cloud computing, IoT and UIDAI is presented.


Author(s):  
Sathiyasheelan Ravichandran ◽  

Cloud computing is a technique for storing the information virtually. It may comprise of database, storage, tools, servers, networking and software services. It deals with virtual storing and retrieving of data from anywhere by the help of internet. This paper uses cloud computing technique in education for uploading study materials, videos, sharing information to the students and for conducting tests. The symmetric key encryption technique is used in this concept, where one key is utilized for both decryption and encryption. The advanced encryption standard algorithm (AES) was used for securing the data in the cloud, where it gives high security and faster execution time. This technique is mainly based on improving the concept of virtual classroom by using cloud computing.


2019 ◽  
Vol 8 (3) ◽  
pp. 2235-2242

Cloud computing gives part of advantages to endeavors to offload their information and software services to cloud administrations by saving them lot of money that must be spent on foundation setup cost. Despite that, while offloading the information privacy and protection is a vital concern. Correspondingly for example when the emergency clinics and medicinal services association transfer their patient's subtleties to cloud and when the information is included, it will influence the protection of the patients. So privacy is a vital concern while offloading the information to cloud. Most of solutions for privacy depend on encryption and information to be offloaded is encoded and put away in cloud. Lots of encryption techniques like cryptography, symmetric key etc. methods are used for encrypting the information before uploading to cloud. However, the reaction in this encryption system is that, the encrypted information isn't structure preserving and it is not suitable for ranking or searching. To solve the complications of this searching and ranking due to disordering a homomorphism encryption based mechanism is proposed but this solution also suffers from the problem of integrity attacks on result. So this paper discussed the enhancement of the homomorphism encryption based mechanism by solving the integrity problems effectively.


Sign in / Sign up

Export Citation Format

Share Document