SECURITY IMPROVEMENT AND TRUST ENHANCEMENT IN CLOUD-BASED SERVICES

Authors

  • Shalabh Negi School of Computer Science Engineering, VIT University Chennai Campus, Chennai Campus, Chennai, Tamil Nadu, India.
  • Jayanthi R School of Computer Science Engineering, VIT University Chennai Campus, Chennai Campus, Chennai, Tamil Nadu, India.

DOI:

https://doi.org/10.22159/ajpcr.2017.v10s1.20525

Keywords:

Cloud computing, Availability, Privacy, Security, Trust as a service, Cloud service provider, Cloud armor, Rivest-Shamir-Adleman, Key size, Geo-tagging

Abstract

Management of trust is one of the most challenging parts in cloud computing. Cloud service's features such as distributed, dynamic and nontransparent
introduces several challenges for availability, privacy, and security. A method is proposed to have trust as a service between cloud service
provider and customer by creating a cloud armor. This proposed methodology is used to make cloud server end and customer end system secure of
any intrusion to their privacy. In this methodology, we will have a user usage pattern log as ever user has its own unique way of using his/her system;
hence, in case if any odd user pattern is being encountered it will automatically block the system and simultaneously shoots a message as well as a call
to the user notifying him/her about this unauthorized access. This log is set a various small pattern log, for example, keylog, preferable website visited,
and time of accessing the system. Further, we have secured these logs using Rivest-Shamir-Adleman algorithm with very large key size.

Downloads

Download data is not yet available.

References

Huang X, Senrio, Senior Member of IEEE, Wang W, Member IEEE. A Noel and Efficient Design for an RSA Cryptosystem With a Very Large Key Size. IEEE Transaction on Circuits and Systems-II: Express

AWS Documentation Provided by Amazon.

Okamoto T, Takashima K. Efficient attribute-based signatures non- formonotone predicates in the standard model. IEEE Transaction on CloudComputing. Vol. 2, No. 4, October-December; 2014.

Noor TH, Sheng QZ, Member IEEE, Yao L, Member IEEE, Dustdar S, et al. Cloud armor: Supporting reputation-based trust management for cloud services. IEEE Transaction on Parallel and Distributed Systems. Vol. 27, No. 2, February; 2016.

Li X, Ma H, Zhou F, Yao W, Member IEEE. T-broker: A trust-aware service brokering scheme for multiple cloud collaborative services. IEEE Transaction on Information Forensics and Security. Vol. 10. No. 7, July; 2015.

Wang Z, Karpovsky M, Life Fellow IEEE, Bu L. Design of reliable and secure devices realizing Shamir’s secret sharing. IEEE Transaction on Computers. Vol. 65. No. 8, August; 2016.

Zawoad S, Hasan R. University of Alabama at Birmingham. Trustworthy Digital Forensics in the Cloud. IEEE Transaction on Computer, March; 2016.

Xu J, Wen Q, Li W, Jin Z. Circuit ciphertext-policy attribute-based hybid encryption with verifiable delegation in cloud computing. IEEE Transaction on Parallel and Distributed Systems. Vol. 27. No. 1,

January; 2016.

Published

01-04-2017

How to Cite

Negi, S., and J. R. “SECURITY IMPROVEMENT AND TRUST ENHANCEMENT IN CLOUD-BASED SERVICES”. Asian Journal of Pharmaceutical and Clinical Research, vol. 10, no. 13, Apr. 2017, pp. 481-4, doi:10.22159/ajpcr.2017.v10s1.20525.

Issue

Section

Original Article(s)