Secured cryptographic data model for cloud

  • Authors

    • Antony Kumar K
    • Neeba E A
    • Durai S
    • Ravikumar .
    https://doi.org/10.14419/ijet.v7i1.7.10632

    Received date: March 26, 2018

    Accepted date: March 26, 2018

    Published date: February 5, 2018

  • Elliptic Curve, Cloud stack
  • Abstract

    Cloud computing turns into the cutting edge engineering of IT Enterprise. Cloud essential key thought is to move the whole information models into the server farms where the portability and administration of information isn't completely reliable. The principle challenge in the cloud is the client information and framework application information is gotten to from the cloud supplier's premises; even security arrangements sent in the premises don't take care of the demand of the clients where the need differs. The on-request security arrangement is alluring, yet now days all the cloud suppliers are utilizing encryption systems to exchange the information and information ask for and reaction. Consequently in this proposition, another security show is proposed for the cloud model to give security highlights. The new thought is to apply elliptic curve cryptography to give the security highlights to on request information handling. This proposition explores the essential issue of cloud computing information security. At last the security demonstrate is conveyed in the cloud OS "open stack" and "cloud stack".

  • References

    1. P. Mell and T. Grance, "Recommendations of the Na-tional Institute of Standards and Technology", 2011, National institute of Standards and Technology, US Department of Commerce
    2. Peeyush Mathur and Nikhil Nishchal, "Cloud Compu-ting: New challenge to the entire computer indus-try", 1st International Conference on Parallel, Dis-tributed and Grid Computing
    3. Fang Liu, Jin Tong, Jian Mao, Robert Bohn, John Messina, Lee Badger and Dawn Leaf, "NIST Cloud Computing Reference Architecture", 2011
    4. W Stallings, "Cryptography and Network Security: Principles and Practices", pp. 420-430, 2009, Prentice Hall
    5. D Hankerson, A Menezes and S Vanstone, "Guide to elliptic curve cryptography", 2004, Springer-Verlag
    6. N Koblitz, "Elliptic Curve Cryptosystem", Journal of mathematics computation, vol. 48, no. 177, pp. 203-209,
    7. Antony Kumar K, Manikandan N.K, Manivannan D “Analysing performance metrics for data centric pro-tocol in Wireless Sensor Networks “, International Journal of Applied Engineering Research, May-2015. Vol: 10, Issue: 8, PP 19819-19827.
    8. V Miller, "Use of elliptic curves in cryptog-raphy", Proc. of Advances in Cryptology-CRYPTO, 85, vol. 218, pp. 417-426
    9. V. Miller, "Uses of elliptic curves in cryptography" in Lecture Notes in Computer Science 218: Advances in Cryptology-CRYPTO, vol. 85, pp. 417-426, 1986, Springer-Verla
    10. N. Koblitz, "Elliptic curve cryptosys-tems", Mathematics of Computation, vol. 48, pp. 203-209, 1987
    11. Antony Kumar K, Manikandan N.K, Manivannan D, Saran Raj S, “A novel security mechanism for IEEE 802.11i”, International Journal of Applied Engineer-ing Research, Mar-2015. Vol: 10, issue: 3, pp- 6745-6754.
    12. C. C. Lee, M. S. Hwang and W. P. Yang, "Extension of authentication protocol for GSM", vol. 150, no. 2, 2003, IEEE
    13. Ray Sangram and G. P. Biswas, "An ECC based pub-lic key infrastructure usable for mobile applica-tions", Proceedings of the Second International Con-ference on Computational Science Engineering and Information Technology-CCSEIT 12
    14. Rashmi , Ramesh Chavan and Manoj Sabnees, "Se-cured mobile messaging", 2012 International Confer-ence on Computing Electronics and Electrical Tech-nologies (ICCEET).
    15. a. S. Durai , N. Rajkumar, N. K. Manikandan and D. Manivannan “Data Entry Works in computer using Voice Keyboard”, Indian Journal of Science and Technology, Vol 9(2), DOI:10.17485/ijst/2016/v9i2/85814, January 2016
  • Downloads

  • How to Cite

    Kumar K, A., E A, N., S, D., & ., R. (2018). Secured cryptographic data model for cloud. International Journal of Engineering and Technology, 7(1.7), 128-131. https://doi.org/10.14419/ijet.v7i1.7.10632