We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

Cloud Computing Security Improvement using Diffie Hellman and AES

by Rameshwari Malik, Pramod Kumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 118 - Number 1
Year of Publication: 2015
Authors: Rameshwari Malik, Pramod Kumar
10.5120/20711-3030

Rameshwari Malik, Pramod Kumar . Cloud Computing Security Improvement using Diffie Hellman and AES. International Journal of Computer Applications. 118, 1 ( May 2015), 25-28. DOI=10.5120/20711-3030

@article{ 10.5120/20711-3030,
author = { Rameshwari Malik, Pramod Kumar },
title = { Cloud Computing Security Improvement using Diffie Hellman and AES },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 118 },
number = { 1 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 25-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume118/number1/20711-3030/ },
doi = { 10.5120/20711-3030 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:00:31.187015+05:30
%A Rameshwari Malik
%A Pramod Kumar
%T Cloud Computing Security Improvement using Diffie Hellman and AES
%J International Journal of Computer Applications
%@ 0975-8887
%V 118
%N 1
%P 25-28
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security is often cited as one of the most contentious issues in Cloud computing. It is argued that as the Cloud is intended to handle large amounts of data, attackers can be sure of a high pay-off for their activities. . In addition, to benefit from the Economies of scale, the applications and operating systems are homogenized to a few images restricting the variations of products used within the Cloud. Millions of users are surfing the Cloud for various purposes, therefore they need highly safe and persistent services. The future of cloud, especially in expanding the range of applications, involves a much deeper degree of privacy, and authentication. We propose a simple data protection model where data is encrypted using AES and Authenticated by Diffie Hellman algorithm before it is launched in the cloud, thus ensuring data confidentiality and security.

References
  1. Ellen Messmer ( 2012 ). Gartner : Growth in Cloud Computing to shape 2013 security trends, Network World [Online]. Available: http://www. networkworld. com/news/2012/120612- gartner-cloud-security-264873. html
  2. SachdevAbhaThakral, and MohitBhansali. "Addressing the Cloud Computing Security Menace. " IJRET, Volume 2, Issue 2, pp. 126-130, Feb 2013.
  3. Chen, Yao, and RaduSion . "On securing untrusted clouds with cryptography. "Proceedings of the 9th annual ACM workshop on Privacy in the electronic society. ACM, 2010.
  4. Talbot, David ( 2009 ). " How Secure Is Cloud Computing?" Technology Review [Online]. Available: http://www. technologyreview. com/computing/23951/
  5. Agudo , Isaac and Nuez , David and Giammatteo , Gabriele and Rizomiliotis, Panagiotis and Lambrinoudakis, Costas. Cryptography Goes to the Cloud. In Lee, Changhoon and Seigneur, Jean-Marc and Park, James J. and Wagner, Roland R. , editors, Secure and Trust Computing, Data Management, and Applications, pages 190–197, Springer Berlin Heidelberg, 2011.
  6. Op – ed : Encryption, not restriction, is the key to safe cloud computing. Available Online: http : / / www. nextgov. com/cloud-computing/2012/10/oped-encryp-tion-not-restriction-key-safe-cloudcomputing/58608/
  7. " Cloud Security and Privacy " , Tim Mather, Subra Kumaraswamy, and ShahedLatif – O'Reilly Book.
  8. Elminaam, DiaaSalama Abdul, Hatem Mohamed Abdul Kader, and Mohie Mohamed Hadhoud. "Performance Evaluation of Symmetric Encryption Algorithms. " IJCSNS International Journal of Computer Science and Network Security 8. 12 (2008): 280-286.
  9. NIST, FIPS PUB 197, "Advanced Encryption Standard (AES)," November 2001 [Online]. Available: http://csrc. nist. gov/publications/fips/fips197/fips- 197. pdf.
  10. MudiliSoujanya, Sarun Kumar "The NIST Definition of Cloud Computing". National Institute of Science and Technology. Retrieved 24 July 2011. ,Personalized IVR system in Contact Center, Department of Computer Science Engineering International Institute of Information Technology Bhubaneswar, India.
  11. ANSI press, 1999. Specified X9. 42: key management using Diffie-Hellman, this standard specifies several variations of unauthenticated Diffie-Hellman key agreement, providing shared symmetric keys
Index Terms

Computer Science
Information Sciences

Keywords

Cloud computing AES D-H Algorithm Security.