CFP last date
20 May 2024
Reseach Article

Identity based Distributed Data Storage using Digital Signature and Diffie Hellmann Key Exchange Mechanism

by R. Allvijay, V. M. Sivagami
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 94 - Number 14
Year of Publication: 2014
Authors: R. Allvijay, V. M. Sivagami
10.5120/16412-6002

R. Allvijay, V. M. Sivagami . Identity based Distributed Data Storage using Digital Signature and Diffie Hellmann Key Exchange Mechanism. International Journal of Computer Applications. 94, 14 ( May 2014), 27-30. DOI=10.5120/16412-6002

@article{ 10.5120/16412-6002,
author = { R. Allvijay, V. M. Sivagami },
title = { Identity based Distributed Data Storage using Digital Signature and Diffie Hellmann Key Exchange Mechanism },
journal = { International Journal of Computer Applications },
issue_date = { May 2014 },
volume = { 94 },
number = { 14 },
month = { May },
year = { 2014 },
issn = { 0975-8887 },
pages = { 27-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume94/number14/16412-6002/ },
doi = { 10.5120/16412-6002 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:17:39.580634+05:30
%A R. Allvijay
%A V. M. Sivagami
%T Identity based Distributed Data Storage using Digital Signature and Diffie Hellmann Key Exchange Mechanism
%J International Journal of Computer Applications
%@ 0975-8887
%V 94
%N 14
%P 27-30
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The widespread use of Internet has increased the demand for computing. Grid computing is a large scale heterogeneous distributed system which helps in sharing of resources such as data storage, computational power, network dynamically. Grid security is an important component of computational grid infrastructure Grid Security solutions addresses critical requirements and are constructed from building blocks comprising cryptographic algorithms and protocols. Choosing the most appropriate algorithm and protocols require an evaluation of performance of various cryptographic technique. Since Grid computing rest on networks, Security issues like privacy, Data Integrity, Authentication and Confidentiality is encountered. Hence, the combination of different mechanisms like encryption, decryption and digital signatures are used to overcome those issues. On these similar terms, a combination of authentication technique, key exchange algorithm blended with an encryption algorithm is employed. RSA Digital Signature algorithm is used to make use of Digital Signature, Diffie- Hellmann Key exchange mechanism for exchanging keys and Data Encryption Standard [DES] for Confidentiality. I propose a three way mechanism for improving the security features of the system. As a part of the work, a performance evaluation of various cryptographic algorithms is made and the results are used for increasing the security features.

References
  1. V. Khmer and Y. Kim, "Securing distributed storage: Challenges, techniques, and systems," in Proc. ACM Workshop On Storage Security And Survivability - StorageSS'05 (V. Atluri, P. Samarati, W. Yurcik, L. Brumbaugh, and Y. Zhou, eds. ), (Fairfax, VA, USA), pp. 9–25, ACM, Nov. 2005.
  2. A. Sahai and B. Waters,"Fuzzy identity based encryption,"Proc. Acvances in Cryptography –Eurocrypt 2005,vol. 3494,LINCS,pp 457-473.
  3. G. Ateniese, K. Fu, M. Green, and S. Hohenberger, "Improved proxy re-encryption schemes with applications to secure distributed storage," ACM Transactions on Information and System Security, vol. 9, no. 1, pp. 1–30, 2006.
  4. M. Green and G. Ateniese, "Identity-based proxy re-encryption," in Proc. Applied Cryptography and Network Security - ACNS'07 (J. Katz and M. Yung, eds. ), vol. 4521 of Lecture Notes in Computer Science, (Zhuhai, China), pp. 288–306, Springer, Jun. 2007.
  5. LiHua, and ZhaoJianPing, "Security Research on P2P Networks" International Conference on Computational Intelligence and Software Engineering, Wuhan, pages 1 – 5, 11-13 Dec. 2009
  6. C. Wang, K. Ren, W. Lou, and J. Li, "Towards Publicly Auditable Secure Cloud Data Storage Services," IEEE Network Magazine, vol. 24, no. 4, pp. 19-24, July/Aug. 2010.
  7. P. Samarati and S. D. C. di Vimercati, "Data protection in outsourcing scenarios: Issues and directions," in Proc. ACM Symposium on Information, Computer and Communications Security - ASIACCS'10 (D. Feng, D. A. Basin, and P. Liu, eds. ), (Beijing, China), pp. 1–14, ACM, Apr. 2010.
  8. H. -Y. Lin and W. -G. Tzeng, "A secure erasure code-based cloud storage system with secure data forwarding," IEEE Transactions on Parallel and Distributed Systems, Digital Object Identifier - 10. 1109/TPDS. 2011. 252, June 2012
  9. Prashant Rewagad and Yogita Pawar, "Use of Digital Signature with Diffie Hellman Key Exchange and AES Encryption Algorithm to Enhance Data Security in Cloud Computing" in International Conference on Communication Systems and Network Technologies, DOI -10. 1109/CSNT. 2013. 97, 2013
Index Terms

Computer Science
Information Sciences

Keywords

Encryption Decryption Digital Signature.