An Innovational Approach to Security in Cloud Environment

Authors

  • Namrata Thakur Gyan Ganga College of Technology, Jabalpur, Madhya Pradesh, India
  • Vimmi Pandey Gyan Ganga College of Technology, Jabalpur, Madhya Pradesh, India
  • Brejesh Singh MPCVV, Rewa, M.P., India

Keywords:

RSA, Trusted Third Party, Security Requirements

Abstract

The cloud computing platform gives people the opportunity for sharing resources, services and. In the last few years, cloud computing has grown from being a promising business concept to one of the fast growing segments of the IT industry. But as more and more information on individuals and companies are placed in the cloud, concerns are beginning to grow about just how safe an environment it is. In this paper we have proposed new security architecture for cloud computing platform. This ensures secure communication system and hiding information from others. It aims at meeting all security requirements.

References

R.L. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems”, Laboratory for Computer Science, Massachusetts Institute of Technology, Cam-bridge, November, 1977

Burt Kaliski, The Mathematics of the RSA Public-Key Cryptosystem, RSA Laboratories

Joan Daemen, Vincent Rijmen, “AES Proposal: Rijndael”, 1999

Joan Daemen, Vincent Rijmen, “Announcing the ADVANCED ENCRYPTION STANDARD (AES)”, Federal Information Processing Standards Publication 197, November 26, 2001

Joshua Holden, Mohammad Musa, Edward Schaefer, and Stephen Wedig, “A Simplified AES Algorithm”, January 2010

Ronald Rivest, “MD5 Message-Digest Algorithm”, rfc 1321, April 1992

Neil M.Haller, “THE S/KEY ONE-TIME PASSWORD SYSTEM”, 1993.

Neil Haller, “A One-Time Password System”, October 23, 1995

Mell, P., Grance, T., (2009). The Nist Definition of Cloud Computing. Recommendations of the National Institute of Standards and Technology. NIST special publication, 2011 National Institute of standards and technology.

Vaquero, L.M., Rodero-Merino, L., Caceres, J., Lindner, M. (2009). A Break in the Clouds: Towards a Cloud Definition. ACM SIGCOMM Computer Communication Review, 39(1), 50-55.

Strickland, J. (2011) How cloud computing works. Howstuffworks.com. Available at: computer.howstuffworks.com/cloud-computing.htm

Vouk, MA. (2008) Cloud Computing - Issues, Research and Implementations. Journal of Computing and Information Technology, 16(4), 235-246.

Buyya (2009), Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems. 25(6) 599-616.

Velte, T., Velte, J., Elsenpeter, R. (2009). Cloud Computing: A Practical Approach. McGraw-Hill Osborne Media.

Downloads

Published

2014-02-28

How to Cite

[1]
N. Thakur, V. Pandey, and B. Singh, “An Innovational Approach to Security in Cloud Environment”, Int. J. Comp. Sci. Eng., vol. 2, no. 2, pp. 52–54, Feb. 2014.