Call for Paper - May 2023 Edition
IJCA solicits original research papers for the May 2023 Edition. Last date of manuscript submission is April 20, 2023. Read More

Secure Cloud Architecture based on YAK and ECC

International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 90 - Number 19
Year of Publication: 2014
Ankit Kumar Singh
Saroj Kumar
Abhishek Rai

Ankit Kumar Singh, Saroj Kumar and Abhishek Rai. Article: Secure Cloud Architecture based on YAK and ECC. International Journal of Computer Applications 90(19):29-33, March 2014. Full text available. BibTeX

	author = {Ankit Kumar Singh and Saroj Kumar and Abhishek Rai},
	title = {Article: Secure Cloud Architecture based on YAK and ECC},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {90},
	number = {19},
	pages = {29-33},
	month = {March},
	note = {Full text available}


In the present scenario security is biggest issue over internet cloud computing acronym is served everywhere in fast and growing computer generation. So security over the cloud is prime concern . In this paper YAK and ECC are security measures use over the cloud YAK is an asymmetric key cryptography. Whereas ECC is an encryption algorithm. So using YAK and ECC over the cloud network administrator can enhance the security measures. As per concerned of security measures these algorithms can fulfill requirements over the cloud In this paper cloud model is proposed on the basis of cloud architecture where YAK and ECC are imposed in cloud architecture for enhancement of security measures


  • M. Joshi, YS Moudgil "SECURE CLOUD STOARGE" International Journal of Computer Science 2011, ijcscn. com.
  • Dr. Chander Kant, Yogesh Sharma "ENHANCED SECURITY ARCHITECTURE FOR CLOUD DATA SECURITY" DCSA Kurukshetra University,ISSN: 2277128X,ijarcsse. com.
  • Arjun Kumar, Byung Gook Lee,Hoonjae Lee,Anu. "SECURE STORAGE AND ACCESS OF DATA IN CLOUD COMPUTING " IEEE 2012 P. 336339.
  • Veerraju Gampala, Sri Lakshmi Inuganti, Satish Muppidi. "DATA SECURITY IN CLOUD COMPUTING WITH ELLIPTIC CURVE CRYPTOGRAPHY" Vol. 2 Isscue 3,july 2012 ijsce. com ISSN: 2231-2307.
  • F. Hao. "ON ROBUST KEY AGREEMENT BASED ON PUBLIC KEY AUTHENTICATION. " Proceedings of the 14th International Conference on Financial Cryptography and Data Security, Tenerife, Spain, LNCS 6052, pp. 383-390, Jan, 2010
  • Sven Bugiel1, Stefan Nurnberger1, Ahmad-Reza Sadeghi1, Thomas Schneider2 "TWIN CLOUDS: AN ARCHITECTURE FOR SECURE CLOUD COMPUTING" 1center of advanced security Germany. fsven. bugiel@trust. cased. de,stefan. nuernberger@trust. cased. de,ahmad. sadeghig@trust. cased. de. 2System Security Lab, Ruhr-University Bochum, Germany. thomas. schneider@trust. rub. de.
  • Kawser Wazed Nafi1, Tonny Shekha Kar2, Sayed Anisul Hoque1, Dr. M. M. A Hashem2 "A NEWER USER AUTHENTICATION, FILE ENCRYPTION AND DISTRIBUTED SERVER BASED CLOUD COMPUTING SERCURITY ARCHITECTURE" 1Lecturer Stamford University Bangladesh. 2 Khulna University of engineering and technology.
  • Ren, Kui, Cong Wang, and Qian Wang. "SECURITY CHALLENGES FOR THE PUBLIC CLOUD. " Internet Computing, IEEE 16. 1 (2012): 69-73.
  • Kaufman, Lori M. "CAN PUBLIC-CLOUD SECURITY MEET ITS UNIQUE CHALLENGES?. "Security & Privacy, IEEE 8. 4 (2010): 55-57.
  • Sosinsky B, Cloud Computing Bible. 1st ed. Wiley; 2011.
  • Guidelines on Security and Privacy in Public Cloud Computing, NIST Special Publication 800-144.
  • C. Cachin, I. Keidar and A. Shraer, "TRUSTING THE CLOUD", ACM SIGACT News, 40, 2009, pp. 81-86.