Volume 60 | Number 1 | Year 2018 | Article Id. IJMTT-V60P509 | DOI : https://doi.org/10.14445/22315373/IJMTT-V60P509
Cloud computing platform is providing opportunity for sharing resources, information’s and services among the users of entire world. Existence of huge secret data on the cloud. The security of cloud becomes a biggest concern for researcher’s, malicious activities are growing with the growth of user in the cloud. Millions of peoples are using cloud for various purpose, that’s why they need more secure and persistent services. In this paper we have purposed new security architecture for cloud computing platform. This ensures more secured communication system and protect your data from attackers. AES based file encryption system and asynchonous key system for exchanging data or information is incorporated into our model. Our proposed structure can be applied with main cloud computing features, e. g, SaaS, IaaS, PaaS. We include OTP (onetime password) system for user authentication ECC (Elliptic curve cryptography) has been proposed in this model for safe communication between client and cloud storage system. Our work primarily deals with the Security system of the whole cloud computing platform.
[1] Ijifr VE. Load Balancing And Security In Multicloud IaaS Using Distributed File System- A Review. International Journal of Informative & Futuristic Research; Volume 2 Issue 4 December 2014 International, ISSN (Online): 2347-1697;IJIFR/ V2/ E4/ 039 Page No. 1051-1055 Research.
[2] Kumar R, Pandey A. A Survey on Security Issues in Cloud Computing. IOSR J Comput Eng. 2016;3(3):506-517. doi:10.15680/IJIRSET.2016.0510073
[3] Vouk M a. Cloud computing — Issues, research and implementations. ITI 2008 - 30th Int Conf Inf Technol Interfaces. 2008:235-246. doi:10.1109/ITI.2008.4588381
[4] Hu Y, Wong J, Iszlai G, Litoiu M. Resource Provisioning for Cloud Computing. published 2009 in CASCON (Center for Advance Studies Conference) DOI:10.1145/1723028.1723041
[5] Ahead S. Cloud Computing : Silver Lining or Storm Ahead?.IA News Letter The Newsletter for Information Assurance Technology Professionals Volume 13 Number 2 • Spring 2010.
[6] Catteddu D, Hogben G. The European Network and Information Security Agency ( ENISA ) is an EU agency created to advance This work takes place in the context of ENISA ’ s Emerging and Future Risk programme . C ONTACT DETAILS : This report has been edited by. Computing. 2009;72(1):2009-2013. doi:10.1007/978-3-642-16120-9_9
[7] Jamil D, Zaki H, Carlin S, Curran K. Cloud Computing Security. Int J Ambient Comput Intell. 2011;3(1):14-19. doi:10.4018/jaci.2011010102
[8] Kumar G, Chelikani A. Analysis of Security Issues in Cloud Based E-Learning. Secur Manag. 2011:1-74.
[9] Shan L. Journal Of Computers and math.pdf; Recent Advances in Intelligent Information Technology& Network Security; ISSN 1796-203XVolume 6, Number 10, October 2011.
[10] Sadeghi A, Schneider T, Winandy M, Horst G. Token-Based Cloud Computing. TRUST 2010;2: LNCS 6101, pp. 417–429; Springer-Verlag Berlin Heidelberg.
[11] Group TC. Solving the Data Security Dilemma with Self-Encrypting Drives. International Journal of Recent Research Aspects(IJRRA) ISSN 2349-7688 2010;May[12].
[12] Kokane M, Jain P, Sarangdhar P. Data Storage Security in Cloud Computing. Int J Adv Res Comput Commun Eng. 2013;2(3):1388-1393.
[13] Bugiel S, Stefan N, Sadeghi A, Schneider T. Twin clouds: An architecture for secure cloud computing,2011:1 11.http://www.zurich.ibm.com/~cca/csc2011/submissions/bugiel.pdf.
[14] Vaquero LM, Rodero-Merino L, Morán D. Locking the sky: A survey on IaaS cloud security. Comput (Vienna/New York). 2011;91(1):93 118. doi:10.1007/s00607-010-0140-x
[15] Thuy D, Nguyen TD, Gondree MA, et al. A Cloud-Oriented Cross-Domain Security Architecture A Cloud-Oriented Cross-Domain Security Architecture. 2010;(November):1701-1707.
[16] Cong Wang, Qian Wang, Kui Ren, Wenjing Lou. Ensuring data storage security in Cloud Computing. 2009 17th Int Work Qual Serv. 2009:1-9. doi:10.1109/IWQoS.2009.5201385
[17] Kaufman LM. Data Security in the Cloud World of Cloud Computing. Ieee. 2009:61-64.
[18] Thuraisingham B, Khadilkar V, Gupta A, Kantarcioglu M, Khan L. Secure data storage and retrieval in the cloud. Proc 6th Int ICST Conf Collab Comput Networking, Appl Work. 2010. doi:10.4108/icst.collaboratecom.2010.15
[19] Hamlen K, Kantarcioglu M, Khan L, Thuraisingham B. Security Issues for Cloud Computing. Int J Inf Secur Priv. 2010;4(2):36-48. doi:10.4018/jisp.2010040103
[20] Abutaha M, Abutaha MS, Amro AA. Using AES , RSA , SHA1 for Securing Cloud. 2015;(April 2014).
[21] Bhardwaj A, Subrahmanyam GVB, Avasthi V, Sastry H. Security Algorithms for Cloud Computing Environment Security Algorithms for Cloud Computing. Procedia - Procedia Comput Sci. 2016;85(December 2015):535-542. doi:10.1016/j.procs.2016.05.215
[22] Arora R, Parashar A. Secure User Data in Cloud Computing Using Encryption Algorithms. International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 Vol. 3, Issue 4, Jul-Aug 2013, pp.1922-19262013.
[23] Salim E, Harba I. Secure Data Encryption Through a Combination of AES, RSA and HMAC. Engineering, Technology & Applied Science Research Vol. 7, No. 4, 2017, 1781-1785:1781-1785.
[24] Johnsson M. Mobile One Time Passwords and RC4 Encryption for Cloud Computing. 2011; Technical report, IDE1108 (March).
[25] Khan AA. Preventing Phishing Attacks using One Time Password and User Machine Identification. International Journal of Computer Applications (0975 – 8887) Volume 68– No.3, April 2013:7-11.
[26] Nadu T. Research Issues on Elliptic Curve Cryptography and Its applications. IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.6, June 2009:19-22.
[27] Verma SK, Ojha DB. A Discussion on Elliptic Curve Cryptography and Its Applications. IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, No 1, January 2012 ISSN (Online): 1694-0814:74-77.
[28] A.MEKMC, Phil M, Sc JM, Phil M, Ph D. Secure Login Using Encrypted One Time Password ( OTP ) and Mobile Based Login Methodology. Research Inventy: International Journal Of Engineering And Science Vol.2, Issue 10 (April 2013), Pp 14-17 Issn(e): 2278-4721.
[29] 6 Saini T. One Time Password Generator System. International Journal of Advanced Research in Computer Science and Software Engineering Research, Volume 4, Issue 6, June 2014 ISSN: 2277 128X
[30] Soni S, Singh SP. Secure and Efficient Integrity Algorithm based on Existing SHA Algorithms. International Journal of Computer Applications (0975 – 8887) Volume 113 – No. 11, March 2015:34-37.
Abid Hussain,Chungen Xu, Muqadar Ali, "Security of Cloud Storage System using Various Cryptographic Techniques," International Journal of Mathematics Trends and Technology (IJMTT), vol. 60, no. 1, pp. 45-51, 2018. Crossref, https://doi.org/10.14445/22315373/IJMTT-V60P509