Secured cryptographic data model for cloud

  • Authors

    • Antony Kumar K
    • Neeba E A
    • Durai S
    • Ravikumar .
    2018-02-05
    https://doi.org/10.14419/ijet.v7i1.7.10632
  • Elliptic Curve, Cloud stack
  • Cloud computing turns into the cutting edge engineering of IT Enterprise. Cloud essential key thought is to move the whole information models into the server farms where the portability and administration of information isn't completely reliable. The principle challenge in the cloud is the client information and framework application information is gotten to from the cloud supplier's premises; even security arrangements sent in the premises don't take care of the demand of the clients where the need differs. The on-request security arrangement is alluring, yet now days all the cloud suppliers are utilizing encryption systems to exchange the information and information ask for and reaction. Consequently in this proposition, another security show is proposed for the cloud model to give security highlights. The new thought is to apply elliptic curve cryptography to give the security highlights to on request information handling. This proposition explores the essential issue of cloud computing information security. At last the security demonstrate is conveyed in the cloud OS "open stack" and "cloud stack".

  • References

    1. [1] P. Mell and T. Grance, "Recommendations of the National Institute of Standards and Technology", 2011, National institute of Standards and Technology, US Department of Commerce

      [2] Peeyush Mathur and Nikhil Nishchal, "Cloud Computing: New challenge to the entire computer industry", 1st International Conference on Parallel, Distributed and Grid Computing

      [3] Fang Liu, Jin Tong, Jian Mao, Robert Bohn, John Messina, Lee Badger and Dawn Leaf, "NIST Cloud Computing Reference Architecture", 2011

      [4] W Stallings, "Cryptography and Network Security: Principles and Practices", pp. 420-430, 2009, Prentice Hall

      [5] D Hankerson, A Menezes and S Vanstone, "Guide to elliptic curve cryptography", 2004, Springer-Verlag

      [6] N Koblitz, "Elliptic Curve Cryptosystem", Journal of mathematics computation, vol. 48, no. 177, pp. 203-209,

      [7] Antony Kumar K, Manikandan N.K, Manivannan D “Analysing performance metrics for data centric protocol in Wireless Sensor Networks “, International Journal of Applied Engineering Research, May-2015. Vol: 10, Issue: 8, PP 19819-19827.

      [8] V Miller, "Use of elliptic curves in cryptography", Proc. of Advances in Cryptology-CRYPTO, 85, vol. 218, pp. 417-426

      [9] V. Miller, "Uses of elliptic curves in cryptography" in Lecture Notes in Computer Science 218: Advances in Cryptology-CRYPTO, vol. 85, pp. 417-426, 1986, Springer-Verla

      [10] N. Koblitz, "Elliptic curve cryptosystems", Mathematics of Computation, vol. 48, pp. 203-209, 1987

      [11] Antony Kumar K, Manikandan N.K, Manivannan D, Saran Raj S, “A novel security mechanism for IEEE 802.11iâ€, International Journal of Applied Engineering Research, Mar-2015. Vol: 10, issue: 3, pp- 6745-6754.

      [12] C. C. Lee, M. S. Hwang and W. P. Yang, "Extension of authentication protocol for GSM", vol. 150, no. 2, 2003, IEEE

      [13] Ray Sangram and G. P. Biswas, "An ECC based public key infrastructure usable for mobile applications", Proceedings of the Second International Conference on Computational Science Engineering and Information Technology-CCSEIT 12

      [14] Rashmi , Ramesh Chavan and Manoj Sabnees, "Secured mobile messaging", 2012 International Conference on Computing Electronics and Electrical Technologies (ICCEET).

      1. S. Durai , N. Rajkumar, N. K. Manikandan and D. Manivannan “Data Entry Works in computer using Voice Keyboardâ€, Indian Journal of Science and Technology, Vol 9(2), DOI:10.17485/ijst/2016/v9i2/85814, January 2016
      2. processing while at the same time expanding adaptability and adaptability for figuring administrations. Cloud computing is web centered registering because of shared assets,
  • Downloads

  • How to Cite

    Kumar K, A., E A, N., S, D., & ., R. (2018). Secured cryptographic data model for cloud. International Journal of Engineering & Technology, 7(1.7), 128-131. https://doi.org/10.14419/ijet.v7i1.7.10632