Keyless signature infrastructure solution for cloud attacks

  • Authors

    • Remya Chandran
    • Dr A. Sasi Kumar
    2018-06-08
    https://doi.org/10.14419/ijet.v7i2.33.14822
  • Cloud Attacks, Block Chain, Markle Tree.
  • Abstract

    Keyless Signature Infrastructure (KSI) is a procedure that is used to distribute and verify the signature; only hash function cryptography is being used in this method. KSI uses block chain technology for the signing and verification of the signature. The paper will discuss the solution of different cloud attacks using Keyless Signature Infrastructure.

     

     

  • References

    1. [1] Raja,JabirMuhammed, Liza, SalamKanji,Huwida, Omar, â€study of Different cloud computing attacks and countermeasuresâ€, International Conference on Advanced Communication Technology (ICACT) , ISBN 978-89-968650-7-0, 2016.

      [2] Prachi,Satheesh,Sharma,“Security-Threats in cloud computingâ€, Computing, Communication & Automation International Conference (ICCCA), July 2015.

      [3] Akashdeep,Vinay,Subhramaniyam,Hanumath, “Solution to cloud DDoS attacksâ€, IEEE July 2016.

      [4] AhtoBudhas,Risto,Andresâ€KSI: Construct universal Distributed- Hash of Treesâ€, International Association for Cryptologic Research(IACR) 2013.

      [5] Jämthagen, Christopher, “On Offensive and Defensive Methods in Software Security†Published: 2016-10-19.

      [6] S.Manikandasaran “Security- Attacks and Cryptographic Different Solutions for Stored Data in Cloud Public Storageâ€, IRACST - International Journal of Computer Science and Information Technology & Security, ISSN: 2249-9555 Vol.6, Feb 2016.

  • Downloads

  • How to Cite

    Chandran, R., & A. Sasi Kumar, D. (2018). Keyless signature infrastructure solution for cloud attacks. International Journal of Engineering & Technology, 7(2.33), 513-514. https://doi.org/10.14419/ijet.v7i2.33.14822

    Received date: 2018-06-30

    Accepted date: 2018-06-30

    Published date: 2018-06-08