SECURITY IMPROVEMENT AND TRUST ENHANCEMENT IN CLOUD-BASED SERVICES
DOI:
https://doi.org/10.22159/ajpcr.2017.v10s1.20525Keywords:
Cloud computing, Availability, Privacy, Security, Trust as a service, Cloud service provider, Cloud armor, Rivest-Shamir-Adleman, Key size, Geo-taggingAbstract
Management of trust is one of the most challenging parts in cloud computing. Cloud service's features such as distributed, dynamic and nontransparent
introduces several challenges for availability, privacy, and security. A method is proposed to have trust as a service between cloud service
provider and customer by creating a cloud armor. This proposed methodology is used to make cloud server end and customer end system secure of
any intrusion to their privacy. In this methodology, we will have a user usage pattern log as ever user has its own unique way of using his/her system;
hence, in case if any odd user pattern is being encountered it will automatically block the system and simultaneously shoots a message as well as a call
to the user notifying him/her about this unauthorized access. This log is set a various small pattern log, for example, keylog, preferable website visited,
and time of accessing the system. Further, we have secured these logs using Rivest-Shamir-Adleman algorithm with very large key size.
Downloads
References
Huang X, Senrio, Senior Member of IEEE, Wang W, Member IEEE. A Noel and Efficient Design for an RSA Cryptosystem With a Very Large Key Size. IEEE Transaction on Circuits and Systems-II: Express
AWS Documentation Provided by Amazon.
Okamoto T, Takashima K. Efficient attribute-based signatures non- formonotone predicates in the standard model. IEEE Transaction on CloudComputing. Vol. 2, No. 4, October-December; 2014.
Noor TH, Sheng QZ, Member IEEE, Yao L, Member IEEE, Dustdar S, et al. Cloud armor: Supporting reputation-based trust management for cloud services. IEEE Transaction on Parallel and Distributed Systems. Vol. 27, No. 2, February; 2016.
Li X, Ma H, Zhou F, Yao W, Member IEEE. T-broker: A trust-aware service brokering scheme for multiple cloud collaborative services. IEEE Transaction on Information Forensics and Security. Vol. 10. No. 7, July; 2015.
Wang Z, Karpovsky M, Life Fellow IEEE, Bu L. Design of reliable and secure devices realizing Shamir’s secret sharing. IEEE Transaction on Computers. Vol. 65. No. 8, August; 2016.
Zawoad S, Hasan R. University of Alabama at Birmingham. Trustworthy Digital Forensics in the Cloud. IEEE Transaction on Computer, March; 2016.
Xu J, Wen Q, Li W, Jin Z. Circuit ciphertext-policy attribute-based hybid encryption with verifiable delegation in cloud computing. IEEE Transaction on Parallel and Distributed Systems. Vol. 27. No. 1,
January; 2016.
Published
How to Cite
Issue
Section
The publication is licensed under CC By and is open access. Copyright is with author and allowed to retain publishing rights without restrictions.