CRYPTOGRAPHIC TECHNIQUES FOR SECURE KEY MANAGEMENT IN PERSONNEL CLOUD
DOI:
https://doi.org/10.22159/ajpcr.2017.v10s1.19759Keywords:
Cloud computing, Key management, Challenges and securities, Cryptographic techniques, Encryption and decryption, Combination of two messagesAbstract
Cloud computing has become an emerging model of IT industry as it can be accessed anywhere in the world on a pay-per-use basic. But, one major problem it is facing in today's challenging world is the security issues. Whenever the data is transferred through different connected networks, the threat is there for the users, that their data might get leaked from outsiders or an unauthorized people.In this paper we propose the solution for the above mentioned problem. We go through the cryptographic techniques by combining the two messages into an encrypted data and then sending it to the destination. We also propose a new method of how to exchange the keys and how the keys get interact at the user and system level.
Downloads
References
Pradeep KV, Vijayakumar V. Survey on the key management for securing the cloud. Procedia Comput Sci 2015;50:115-21.
Zhengzhou SL, Zhengzhou DZ. Research on Key Management Infrastructure in Cloud Computing Environment. Henan, China: Information Science and Technology Institute Zhengzhou; 2002.
Damgård I, Jakobsen TP, Nielsen JB, Pagter JI. Secure Key Management in the Cloud. Oxford, UK: IMACC; 2013.
Wang Y, Li Z, Sun Y. Cloud Computing Key Management Mechanism For Cloud Storage; 2015.
Shabir MY, Iqbal A, Mahmood Z, Ghafoor AU. Analysis of classical encryption techniques in cloud computing. Tsinghua Sci Technol 2016;21(1):102-13.
Kumar NS, Lakshmi GV, Balamurugan B. Enhanced attribute based encryption for cloud computing. Procedia Comput Sci 2015;46:689-96.
Patel A, Soni K. Cloud computing security using federated key management. Int J Eng Comput Sci 2014;3(2):3978-81.
Ye X, Chen X, Wang H, Zeng X, Shao G, Yin X, et al. An anomalous behavior detection model in cloud computing. Tsinghua Sci Technol 2016;21(3):323-32.
User-Centric Key Management Scheme for Personal Cloud Storage, IEEE.
Fakhar F, Shibli MA. Management of Symmetric Cryptographic Keys in Cloud Based Environment; 2013.
Chen Y, Yang G. Efficient and Secure Group Key Management Based on EBS and Attribute Encryption; 2011.
Tysowski PK, HasanMA. Senior member, hybrid attribute-and re-encryption-based key management for secure and scalable mobile applications in clouds. IEEE Trans Cloud Comput 2013;1(2):172-86.
Binbusayyis A, Zhang N. Decentralized Attribute Based Encryption Scheme with Scalable Revocation for Sharing Data in Public Cloud Servers; 2015.
Jia H, Chen Y, Mao X, Dou R. Efficient and Scalable Multicast Key Management Using Attribute Based Encryption; 2010.
Nabeel M, Shang N, Fellow E. Privacy Preserving Policy Based Content Sharing in Public Clouds; 2013.
Li J, Chen X, Li M, Li J, Lee PP, Lou W. Secure deduplication with efficient and reliable convergent key management. IEEE Trans Parallel Distrib Syst 2014;25(6):1615-25.
Tysowski PK, Hasan MA. Cloud-Hosted Key Sharing Towards Secure and Scalable Mobile Applications in Clouds; 2013.
Published
How to Cite
Issue
Section
The publication is licensed under CC By and is open access. Copyright is with author and allowed to retain publishing rights without restrictions.