CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Using Kerberos with Digital Signature and AES Encryption to Provide Data Security in Cloud Computing

by Sreeja Nair, Nupur Gautam, Meenakshi Choudhary
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 95 - Number 18
Year of Publication: 2014
Authors: Sreeja Nair, Nupur Gautam, Meenakshi Choudhary
10.5120/16695-6820

Sreeja Nair, Nupur Gautam, Meenakshi Choudhary . Using Kerberos with Digital Signature and AES Encryption to Provide Data Security in Cloud Computing. International Journal of Computer Applications. 95, 18 ( June 2014), 25-29. DOI=10.5120/16695-6820

@article{ 10.5120/16695-6820,
author = { Sreeja Nair, Nupur Gautam, Meenakshi Choudhary },
title = { Using Kerberos with Digital Signature and AES Encryption to Provide Data Security in Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { June 2014 },
volume = { 95 },
number = { 18 },
month = { June },
year = { 2014 },
issn = { 0975-8887 },
pages = { 25-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume95/number18/16695-6820/ },
doi = { 10.5120/16695-6820 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:19:47.274491+05:30
%A Sreeja Nair
%A Nupur Gautam
%A Meenakshi Choudhary
%T Using Kerberos with Digital Signature and AES Encryption to Provide Data Security in Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 95
%N 18
%P 25-29
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The Cloud Computing is the next generation platform that provides dynamic resources pools, virtualization, and high availableness. Today, with the assistance of those computing, we are able to utilize ascendable, distributed computing environments among the boundary of the web, It provides several edges in terms of low value and accessibility of information, conjointly offers associate degree innovative business model for organizations to adopt It's services while not forthright investment. Except for these potential gains achieved from the cloud computing, there are plenty of security problems and challenges related to it and conjointly knowledge privacy protection and knowledge retrieval management is one in all the foremost difficult analysis add cloud computing. To supply security a range of cryptography algorithms and mechanisms are used. Several researchers opt for the simplest they found and use it numerous combinations to supply security to the information in cloud. In this paper, we've got planned to form use of Digital signature and Kerberos with Advanced Encryption Standard cryptography (AES) algorithm program to guard Authentication, Confidentiality, and Integrity of information hold on in cloud.

References
  1. Farhan Basher Sheikh and Sajjad Haider "Security Threats in Cloud Computing", 2011 IEEE sixth international conference on net Technology and secured transactions, 11-14 Gregorian calendar month 2011, national capital U. S. of Arab Emirates.
  2. G. J. Popek and R. P. Goldberg,"Formal necessities for virtualizable third generation architectures", Communications of ACM, vol. 17, no. 7, 1974 pp. 412-421.
  3. P. Barham et al," Xen and also the art of virtualization", in proceedings of the nineteenth ACM conference on in Operation Systems principles (SOSP'03), New York, USA, 19-22 October 2003,pp. 164-177.
  4. G. Jai arul Jose, C. Sajeev, Dr. C. Suyambulingom "Implementation of information security in Cloud Computing" International Journal of P2P network trends and Technology Volume1 Issue1-2011.
  5. Sherif el-Etriby, Eman M. Mohamed and Hatem s. Abdelkader revealed "modern cryptography techniques for Cloud Computing randomness and Performance testing "Within the third international conference on communications and knowledge technology ICCIT 2012.
  6. Uma Somani, Kanika Lakhani, manish Mundra "Implementing Digital Signature with RSA Cryptography rule to boost the information security of Cloud in Cloud Computing" 2010 IEEE first International Conference on Parallel, distributed and Grid Computing (PDGC-2010).
  7. Mehdi Hojabri & Island Heidari, department of atomic number 55 and SE Andhra University, Vizag, asian nation E-mail: hozhabri64@gmail. com, monaheid@gamil. com "Union of RSA rule, Digital signature and KERBEROS in Cloud Security".
  8. Mr. prashant Rewagad*1 box, Dept of computing & Engineering prashant_rewagad@rediffmail. com Ms. Yogita Pawar*2 M. E. student, Dept of Computing & Engineering pawaryogita04@gamil. com. "Use of Digital signature with differ hellman key Exchange and AES cryptography rule to boost information Security in Cloud Computing".
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Digital Signature Kerberos AES Encryption Algorithm.