CFP last date
22 April 2024
Reseach Article

Use of Diffie Hellman Key Exchange for Information Transmission and File Integrity Monitoring in Cloud

by Shweta Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 122 - Number 7
Year of Publication: 2015
Authors: Shweta Sharma
10.5120/21714-4845

Shweta Sharma . Use of Diffie Hellman Key Exchange for Information Transmission and File Integrity Monitoring in Cloud. International Journal of Computer Applications. 122, 7 ( July 2015), 28-33. DOI=10.5120/21714-4845

@article{ 10.5120/21714-4845,
author = { Shweta Sharma },
title = { Use of Diffie Hellman Key Exchange for Information Transmission and File Integrity Monitoring in Cloud },
journal = { International Journal of Computer Applications },
issue_date = { July 2015 },
volume = { 122 },
number = { 7 },
month = { July },
year = { 2015 },
issn = { 0975-8887 },
pages = { 28-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume122/number7/21714-4845/ },
doi = { 10.5120/21714-4845 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:09:57.880618+05:30
%A Shweta Sharma
%T Use of Diffie Hellman Key Exchange for Information Transmission and File Integrity Monitoring in Cloud
%J International Journal of Computer Applications
%@ 0975-8887
%V 122
%N 7
%P 28-33
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In today’s computing era,there has arisen an immense requirement for secure and trusted security frameworks/models in cloud computing.These models allow the cloud service provider to establish a trusted bond among clients,which is the prime requisite for cloud e-businesses nowadays. Keeping this orientation in mind,we have proposed a comprehensive security framework which provides extra layer of security to the information transmitted among client and server ends & also sustains the information integrity at both terminals.It provides the data security during storage at cloud server . This incorporates confidentiality,authentication and integrity of the involved information among client-server terminals.Numerous cryptographic algorithms have been used to apply in the implemented tool. Diffie- Hellman key exchange scheme has been applied in this research work.

References
  1. G A Solanki, “Welcome to the Future of Computing: Cloud Computing and Legal Issues”, International Journal of Scientific & Technology Research 2012, vol1, issue 9.
  2. Jian Wang, Yan Zhao, Shuo Jiang, Jiajin Le, “Providing Privacy Preserving in Cloud Computing” 2010, IEEE.
  3. Nelson Gonzalez, Charles Miers, Fernando Redigolo, Marcos Simplicio, Tereza Carvalho, Mats Naslund, Makan Pourzandi, “A quantitative analysis of current security concerns and solutions for cloud computing”, Gonzalez et al. Journal of Cloud Computing: Advances, Systems and Applications 2012.
  4. Lijun Mei, W .K .Chan, T .H .Tse, “A Tale of Clouds: Paradigm comparisons and some thoughts on research issues”, 2008 IEEE Asia-Pacific Services Computing Conference.
  5. Balachandra Reddy Kandukuri, Ramakrishna Paturi V, Dr. Atanu Rakshit, “Cloud security Issues”2009, IEEE.
  6. M. Sudha, M. Monika, “Enhanced Security Framework to Ensure Data Security in Cloud Computing Using Cryptography”, Advances in Computer Science and its Applications 32 Vol. 1, No. 1, March 2012, Copyright © World Science Publisher, United States. www.worldsciencepublisher.org.
  7. Hongwei Li, Yuanshun Dai, Ling Tian and Haomiao Yang, “Identity-Based Authentication for Cloud Computing”, Springer - Verlag Berlin Heidelberg 2009.
  8. Sanchika Gupta, Anjali Sardana, Padam Kumar, “A light Weight Centralized File Monitoring Approach for Securing Files in Cloud Environment ”,The 7th International Conference for Internet Technology and Secured Transactions (ICITST-2012) ©IEEE 2012.
  9. Sanchika Gupta, Anjali Sardana, Padam Kumar , Ajith Abraham, “A secure and light weight approach for critical data security in cloud”, 2012 Fourth International Conference on Computational Aspects of Social Networks (CA Sons).
  10. Forouzan, “Cryptography and Network Security”, TMH 2012.
  11. A.H. Steven, F. Stephanie and S. Anil, "Intrusion detection using sequences of system calls," J Compul. Secure. Vol. 6, no. 3, 1998, pp. 151-180.
  12. G. P. Adam, D. S. John, G. John Linwood, A. N. S. Craig, R. G. Garth and R. G. Gregory, "Storage-based intrusion detection: watching storage activity for suspicious behavior," Book Storage-based intrusion detection: watching storage activity for suspicious behavior, Series Storage-based intrusion detection: watching storage activity for suspicious behavior, ed., Editor ed/'eds., USENIX Association, 2003.
  13. S. Patil, A. Kashyap, G. Sivathanu and E. Zadok, “13FS: An in-kernel integrity checker and intrusion detection file system."
  14. Q. Nguyen Anh and T. Yoshiyasu,"A novel approach for a file-system integrity monitor tool of Xen virtual machine," Book A novel approach for a file-system integrity monitor tool of Xen virtual machine, Series A novel approach for a file-system integrity monitor tool of Xen virtual machine, ed.,Editor ed.ls\eds., ACM, 2007.
  15. R.K.L. Ko, P. Jagadpramana and L. Bu Sung, "Flogger: A File-Centric Logger for Monitoring File Access and Transfers within Cloud Computing Environments," Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on , pp. 765-771.
  16. H. K. Gene and H. S. Eugene, "The design and implementation of tripwire: a file system integrity checker,"BookThedesignandimplementationoftripwire:aile system integrity checker, Series The design and implementation of tripwire: a file system integrity checker, ed., Editors, ACM, 1994.
  17. Meiko Jensen, Jorg Schwenk, Nils Gruschka, Luigi Lo Iacono, “On technical security issues in cloud computing” 2009, IEEE Computer Society.
  18. Henry Kasim, Terence Hung, Xiaorong Li, “Data Value Chain as a Service Framework: for Enabling Data Handling, Data Security and Data Analysis in the Cloud”, 2012 IEEE 18th International Conference on Parallel and Distributed Systems.
  19. Tina Francis, S. Vadivel, “Cloud Computing Security: Concerns, Strategies and Best Practices: Proceedings of 2012 1ntemational of Cloud Computing, Technologies, Applications & Management”, 2012 IEEE.
  20. G A Solanki, “Welcome to the Future of Computing: Cloud Computing and Legal Issues”, International Journal of Scientific & Technology Research 2012, vol1, issue 9.
Index Terms

Computer Science
Information Sciences

Keywords

Deffie Hellman Key exchange Information Integrity Hash Algorithms (NLIDB)