Cloud Security System With Sequel Homomorphic Encryption and Diffie-Hellman Algorithm
Keywords:
Secure Cloud Computing Architecture, Security, Sequel Homomorphic Encryption, Diffie-Hellman algorithmAbstract
A set of resources and services offered over the Internet, is called cloud computing. These computing services are delivered from data centers located across the world. Cloud computing consumers benefited by providing virtual resources via internet such as Platform, Infrastructure and Software as a Service. The consequential challenge in cloud computing are the privacy and security issues caused by its multi-tenancy nature and the outsourcing of infrastructure, sensitive data. It is available on Pay-Per-Use model. Various malicious activities from illegal users have threatened this technology such as data misuse, inflexible access control mechanism. The occurrence of these threats may result into spoil or illegal access of critical and private data of end user and business user. In this paper, we identify the most vulnerable security issues or attribute in cloud computing architecture, which will enable both end users and vendors to know about the key security threats associated with cloud computing and propose relevant solution directives to strengthen security in the cloud computing environment. We propose secure cloud architecture by using sequel homomorphic encryption scheme with diffie-hellman algorithm for organizations to strengthen the security mechanism
References
[1] Aditi Soral, “Achieving Fully Homomorphic Encryption in Security -A Survey”, SSRG International Journal of Computer Science and Engineering (SSRG-IJCSE) , Vol.3, Issue.2, pp. 2348 – 8387.
[1] Anjana Chaudhary, Ravinder Thakur, Manish Mann “Security In Cloud Computing By Using Sequel Homomorphic Encryption Scheme With Diffie-Hellman Algorithm”, International Journal of Advanced Computational Engineering and Networking, Vol.2, Issue.10, pp. 2320-2106.
[2] Umer Khalida,Abdul Ghafoor, Misbah Irum, Muhammad Awais Shibli “Cloud based Secure and Privacy Enhanced Authentication & Authorization Protocol”, ScienceDirect, Procedia Computer Scurity, pp 22(2103) 680 – 688
[3] Kashif Munir1, Dr. Sellapan Palaniappan, “Secure Cloud Architecture”, International Journal of Advanced Computing Vol.4, Issue.1.
[4] Tim Mather, Subra Kumaraswamy, Shahed Latif Cloud Security and Privacy: An Enterprise perspective of Risks and Compliance, O`Reilly Media, Inc.,2009.
[5] L.Arockiam,S.Monikandan & G.Parthasarathy “Cloud Computing: A Survey” http://interscience.in/IJIC_Vol1Iss2/paper5.pdf
[6] Anitha Y “Security Issues in Cloud Computing - A Review” in International Journal of Thesis Projects and Dissertations (IJTPD) Vol. 1, Issue 1, PP: (1-6),Month: October-December 2013.
[7] R. Kalaichelvi Chandrahasan, S Shanmuga Priya and Dr. L. Arockiam “Research Challenges and Security Issues in Cloud Computing” in International Journal of Computational Intelligence and Information Security, March 2012 Vol. 3, No. 342
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
