CFP last date
22 April 2024
Reseach Article

A Novel Cryptographic Key Distribution Scheme for Cloud Platforms

by Satpreet Kaur, Mandeep Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 122 - Number 3
Year of Publication: 2015
Authors: Satpreet Kaur, Mandeep Singh
10.5120/21682-4782

Satpreet Kaur, Mandeep Singh . A Novel Cryptographic Key Distribution Scheme for Cloud Platforms. International Journal of Computer Applications. 122, 3 ( July 2015), 22-25. DOI=10.5120/21682-4782

@article{ 10.5120/21682-4782,
author = { Satpreet Kaur, Mandeep Singh },
title = { A Novel Cryptographic Key Distribution Scheme for Cloud Platforms },
journal = { International Journal of Computer Applications },
issue_date = { July 2015 },
volume = { 122 },
number = { 3 },
month = { July },
year = { 2015 },
issn = { 0975-8887 },
pages = { 22-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume122/number3/21682-4782/ },
doi = { 10.5120/21682-4782 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:09:38.037009+05:30
%A Satpreet Kaur
%A Mandeep Singh
%T A Novel Cryptographic Key Distribution Scheme for Cloud Platforms
%J International Journal of Computer Applications
%@ 0975-8887
%V 122
%N 3
%P 22-25
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The problem of secure data transmission on cloud environments is addressed in the proposed security model. The data security is quite important on cloud environments because they belongs the users. The security layer is defined or implemented between the cloud user and server end to ensure the security of data being exchanged between them. In this research, a key exchange scheme has been proposed to ensure the security of cloud platforms. The proposed model under this research project presents improved random key management architecture, which may be called efficient multi-level complex key sharing and authorizing model (EMCKS) for the cloud platforms. In particular, the proposed model allows only authorized applications and/or users to use the keys. Using simple devices, administrators can remotely issue authenticated commands to EMCKS and verify system output. In this research, we will develop the proposed scheme named EMCKS for corporate key management technique adaptable for the clouds by making it efficient and quicker. In addition, it also has to be improved to work with Cloud server and client nodes, which enforces the proposed scheme to create a secure environment based cloud platforms. The proposed scheme has been noticed providing hardened security than the other key management architectures as it is based on non-predictive key generation mechanism. The results have shown the effectiveness of the proposed model in terms of elapsed time.

References
  1. Zongwei Zhou, Jun Han, Yue-Hsun Lin, Adrian Perrig, Virgil Gligor, "KISS: Key it Simple and Secure Corporate Key Management", Trust and Trustworthy Computing Lecture Notes in Computer Science, volume 7904, pp. 1-18, Springer, 2013.
  2. N. Suganthi, V. Sumathy, "Energy Efficient Key Management Scheme for Wireless Sensor Networks", vol 9, issue 1, pp. 71-78, INT J COMPUT COMMUN, 2014.
  3. Ivan Damgård, Thomas P. Jakobsen, Jesper Buus Nielsen, and Jakob I. Pagter, "Secure Key Management in the Cloud", Cryptography and Coding Lecture Notes in Computer Science, volume 8306, pp. 270-289, Springer, 2013.
  4. Ramaswamy Chandramouli, Michaela Iorga, Santosh Chokhani, "Cryptographic Key Management Issues & Challenges in Cloud Services", Computer Security Division Information Technology Laboratory, NIST, 2013.
  5. Marco Tiloca, Domenico De Guglielmo, Gianluca Dini and Giuseppe Anastasi, "SAD-SJ: a Self-Adaptive Decentralized solution against Selective Jamming attack in Wireless Sensor Networks", ETFA, vol. 18, pp. 1-8, IEEE, 2013.
  6. Md. Monzur Morshed, Md. Rafiqul Islam, "CBSRP: Cluster Based Secure Routing Protocol", IACC, vol. 3, pp. 571-576, IEEE, 2013.
  7. Patrice Seuwou, Dilip Patel, Dave Protheroe, George Ubakanma "Effective Security as an ill-defined Problem in Vehicular Ad hoc Networks (VANETs)".
  8. Sonam Palden Barfunga Prativa Rai, Hiren Kumar Deva Sarma, "Energy Efficient Cluster Based Routing Protocol for Wireless Sensor Networks", ICCCE IEEE 2012, 3-5 July 2012, Kuala Lumpur, Malaysia.
  9. Sajal Sarkar, Raja Datta, "A Trust Based Protocol for Energy-Efficient Routing in Self-Organized MANETs", IEEE 2012.
  10. Said BEN ALL*, Abdellah EZZATI, Abderrahim BENI HSSANE, Moulay Lahcen HASNAOUI, "Hierarchical Adaptive Balanced energy efficient Routing Protocol (HABRP) for heterogeneous wireless sensor networks", IEEE, 2010.
  11. Javed, Muhammad A. , and Jamil Y. Khan. "A Geocasting technique in an IEEE802. 11p based vehicular ad hoc network for road traffic management. " Australasian Telecommunication Networks and Applications Conference (ATNAC), 2011. IEEE, 2011.
  12. William B. Davis, "Graphical Model Theory for Wireless Sensor Networks" (December 8, 2002). Lawrence Berkeley National Laboratory. Paper LBNL-53452.
  13. J. Kusuma, L. Doherty, and K. Ramchandran, "Distributed Compression for Sensor Networks, International Conference on Image Processing (ICIP), October 2001.
  14. Dragan Petrovi?, Rahul C. Shah, Kannan Ramchandran, Jan Rabaey, "Data Funneling: Routing with Aggregation and Compression for Wireless Sensor Networks", First IEEE International Workshop on Sensor Network Protocols and Applications, May 11, 2003.
  15. Raymond Wagner, Shriram Sarvotham, Hyeokho Choi, Richard Baraniuk, "Distributed Multiscale Data Analysis and Processing For Sensor Networks", Rice University Technical Report, February 9, 2005.
  16. Karim Seada, Marco Zuniga, Ahmed Helmy, Bhaskar Krishnamachari, "Energy Efficient Forwarding Strategies for Geographic Routing in Lossy Wireless Sensor Networks," ACM Sensys 2004, November 2004.
  17. Scott Briles, Joseph Arrowood, Dakx Turcotte, Etienne Fiset, "Hardware-In-The-Loop Demonstration of a Radio Frequency Geolocation Algorithm", Proceedings of the Mathworks International Aerospace and Defense Conference, May 24-25, 2005.
  18. da S Arau?jo, H. , and Raimir Holanda Filho. "Wsn routing: An geocast approach for reducing consumption energy. " In Wireless Communications and Networking Conference (WCNC), 2010 IEEE, pp. 1-6. IEEE, 2010.
  19. Shim, Young-Chul, and C. V. Ramamoorthy. "Monitoring and control of distributed systems. " In Systems Integration, 1990. Systems Integration'90. , Proceedings of the First International Conference on, pp. 672-681. IEEE, 1990.
  20. Alain Bertrand, Bomgni, and Myoupo Jean Frédéric. "An energy-efficient clique-based geocast algorithm for dense sensor networks. " Communications and Network 2010 (2010).
  21. Qian, Yi, Kejie Lu, and Nader Moayeri. "Performance evaluation of a secure MAC protocol for vehicular networks. " Military Communications Conference, 2008. MILCOM 2008. IEEE. IEEE, 2008.
  22. Dias, João A. , et al. "Testbed-based performance evaluation of routing protocols for vehicular delay-tolerant networks. "GLOBECOM Workshops (GC Wkshps), 2011 IEEE. IEEE, 2011.
  23. Hung, Chia-Chen, Hope Chan, and EH-K. Wu. "Mobility pattern aware routing for heterogeneous vehicular networks. " Wireless Communications and Networking Conference, 2008. WCNC 2008. IEEE. IEEE, 2008.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud security authentication key management secure access channel security