CFP last date
22 April 2024
Reseach Article

Secure Cloud Architecture based on YAK and ECC

by Ankit Kumar Singh, Saroj Kumar, Abhishek Rai
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 90 - Number 19
Year of Publication: 2014
Authors: Ankit Kumar Singh, Saroj Kumar, Abhishek Rai
10.5120/15831-4706

Ankit Kumar Singh, Saroj Kumar, Abhishek Rai . Secure Cloud Architecture based on YAK and ECC. International Journal of Computer Applications. 90, 19 ( March 2014), 29-33. DOI=10.5120/15831-4706

@article{ 10.5120/15831-4706,
author = { Ankit Kumar Singh, Saroj Kumar, Abhishek Rai },
title = { Secure Cloud Architecture based on YAK and ECC },
journal = { International Journal of Computer Applications },
issue_date = { March 2014 },
volume = { 90 },
number = { 19 },
month = { March },
year = { 2014 },
issn = { 0975-8887 },
pages = { 29-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume90/number19/15831-4706/ },
doi = { 10.5120/15831-4706 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:11:30.297594+05:30
%A Ankit Kumar Singh
%A Saroj Kumar
%A Abhishek Rai
%T Secure Cloud Architecture based on YAK and ECC
%J International Journal of Computer Applications
%@ 0975-8887
%V 90
%N 19
%P 29-33
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the present scenario security is biggest issue over internet cloud computing acronym is served everywhere in fast and growing computer generation. So security over the cloud is prime concern . In this paper YAK and ECC are security measures use over the cloud YAK is an asymmetric key cryptography. Whereas ECC is an encryption algorithm. So using YAK and ECC over the cloud network administrator can enhance the security measures. As per concerned of security measures these algorithms can fulfill requirements over the cloud In this paper cloud model is proposed on the basis of cloud architecture where YAK and ECC are imposed in cloud architecture for enhancement of security measures

References
  1. M. Joshi, YS Moudgil "SECURE CLOUD STOARGE" International Journal of Computer Science 2011, ijcscn. com.
  2. M. Premkumar "A SECURE CLOUD STORAGE SYSTEM WITH INCREASE AVALIABILTY AN ROBUSTNESS" 2012, ijeres. org.
  3. Dr. Chander Kant, Yogesh Sharma "ENHANCED SECURITY ARCHITECTURE FOR CLOUD DATA SECURITY" DCSA Kurukshetra University,ISSN: 2277128X,ijarcsse. com.
  4. Arjun Kumar, Byung Gook Lee,Hoonjae Lee,Anu. "SECURE STORAGE AND ACCESS OF DATA IN CLOUD COMPUTING " IEEE 2012 P. 336339.
  5. Veerraju Gampala, Sri Lakshmi Inuganti, Satish Muppidi. "DATA SECURITY IN CLOUD COMPUTING WITH ELLIPTIC CURVE CRYPTOGRAPHY" Vol. 2 Isscue 3,july 2012 ijsce. com ISSN: 2231-2307.
  6. F. Hao. "ON ROBUST KEY AGREEMENT BASED ON PUBLIC KEY AUTHENTICATION. " Proceedings of the 14th International Conference on Financial Cryptography and Data Security, Tenerife, Spain, LNCS 6052, pp. 383-390, Jan, 2010
  7. Sven Bugiel1, Stefan Nurnberger1, Ahmad-Reza Sadeghi1, Thomas Schneider2 "TWIN CLOUDS: AN ARCHITECTURE FOR SECURE CLOUD COMPUTING" 1center of advanced security Germany. fsven. bugiel@trust. cased. de,stefan. nuernberger@trust. cased. de,ahmad. sadeghig@trust. cased. de. 2System Security Lab, Ruhr-University Bochum, Germany. thomas. schneider@trust. rub. de.
  8. Kawser Wazed Nafi1, Tonny Shekha Kar2, Sayed Anisul Hoque1, Dr. M. M. A Hashem2 "A NEWER USER AUTHENTICATION, FILE ENCRYPTION AND DISTRIBUTED SERVER BASED CLOUD COMPUTING SERCURITY ARCHITECTURE" 1Lecturer Stamford University Bangladesh. 2 Khulna University of engineering and technology.
  9. Ren, Kui, Cong Wang, and Qian Wang. "SECURITY CHALLENGES FOR THE PUBLIC CLOUD. " Internet Computing, IEEE 16. 1 (2012): 69-73.
  10. Kaufman, Lori M. "CAN PUBLIC-CLOUD SECURITY MEET ITS UNIQUE CHALLENGES?. "Security & Privacy, IEEE 8. 4 (2010): 55-57.
  11. Sosinsky B, Cloud Computing Bible. 1st ed. Wiley; 2011.
  12. Guidelines on Security and Privacy in Public Cloud Computing, NIST Special Publication 800-144.
  13. C. Cachin, I. Keidar and A. Shraer, "TRUSTING THE CLOUD", ACM SIGACT News, 40, 2009, pp. 81-86.
Index Terms

Computer Science
Information Sciences

Keywords

CIA (confidentiality integrity availability) YAK [6] ECC (elliptical curve cryptography)[5].