Cloud security: to prevent unauthorized access using an efficient key management authentication algorithm

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    Presently a-days Cloud registering is rising field in light of its Performance, high accessibility, easily. Information store is principle             future that cloud benefit gives to the huge association to store tremendous measure of information. Yet at the same time numerous              associations are not prepared to execute distributed computing innovation since absence of security. So the principle goal of this paper is to understand the security issues and to anticipate unapproved access in distributed storage, it should be possible with the assistance of an effective validation strategy by utilizing cross breed verification calculation to give security of the information in cloud and guarantee amending code to keep up the nature of administration. In any case, solid client confirmation that confines illicit access to the               administration giving servers is the foremost prerequisite for securing cloud condition



  • Keywords

    Cloud Computing, Data Storage, Cloud Security, Blowfish Algorithm, Ensure Correcting Code.

  • References

      [1] Dillon T, Wu C & Chang E, “Cloud Computing: Issues and Challenges”, 24th IEEE International Conference on Advanced Information Networking and Applications(AINA), (2010), pp.27-33.

      [2] Zhou MQ, Zhang R, Xie W, Qian WN & Zhou A, “Security and Privacy in Cloud Computing: A Survey”, Sixth International Conference on Semantics, Knowledge and Grids(SKG), (2010), pp.105-112.

      [3] Yang JF & Chen ZB, “Cloud Computing Research and Security Issues”, IEEE International Conference on Computational Intelligence and Software Engineering (CiSE), (2010), pp.1-3.

      [4] Zhang S, Zhang SF, Chen XB & Huo XZ, “Cloud Computing Research and Development Trend”, Proceedings of the Second International Conference on Future Networks, (2010), pp. 93-97.

      [5] Kuptsov D, Khurri A & Gurtov A, “Distributed user authentication in Wireless LANs”, IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops, (2009), pp.1-9.

      [6] Tsai CS & Hung CI, “An Enhanced Secure Mechanism of Access Control”, Second International Conference on Communication Systems, Networks and Applications (ICCSNA), pp.119-122, (2010).

      [7] Chen TH, Yeh HL & Shih WK, “An Advanced ECC Dynamic ID-Based Remote Mutual Authentication Scheme for Cloud Computing”, IEEE conf. on Multimedia and Ubiquitous Engineering, (2011).

      [8] Ibrahem MK, “Modification of Diffie-Hellman key exchange algorithm for Zero knowledge proof”, future Communication Networks (ICFCN), (2012), pp.147-152.

      [9] Dinesha H & Agrawal V, “Multi-level authentication technique for accessing cloud services”, International Conference on Computing, Communication and Applications, (2013), pp.1-4.

      [10] Moyo T & Bhogal J, “Investigating Security Issues in Cloud Computing”, Eighth International Conference on Complex, Intelligent and Software Intensive Systems, (2014).

      [11] Babaeizadeh M, Bakhtiari M & Mohammed AM, “Authentication Methods in Cloud Computing: A Survey”, Research Journal of Applied Sciences, Engineering and Technology, (2015).

      [12] Zarad MM, Abdel-Hafez AA & Hassanein AH, “Secure and Efficient Authentication Scheme for Cloud Computing”, International Journal of Computer Applications, (2016).




Article ID: 10787
DOI: 10.14419/ijet.v7i1.1.10787

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.