Open Access   Article Go Back

An Innovational Approach to Security in Cloud Environment

N. Thakur1 , V. Pandey2 , B. Singh3

Section:Survey Paper, Product Type: Journal Paper
Volume-2 , Issue-2 , Page no. 52-54, Feb-2014

Online published on Feb 28, 2014

Copyright © N. Thakur, V. Pandey, B. Singh . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: N. Thakur, V. Pandey, B. Singh, “An Innovational Approach to Security in Cloud Environment,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.2, pp.52-54, 2014.

MLA Style Citation: N. Thakur, V. Pandey, B. Singh "An Innovational Approach to Security in Cloud Environment." International Journal of Computer Sciences and Engineering 2.2 (2014): 52-54.

APA Style Citation: N. Thakur, V. Pandey, B. Singh, (2014). An Innovational Approach to Security in Cloud Environment. International Journal of Computer Sciences and Engineering, 2(2), 52-54.

BibTex Style Citation:
@article{Thakur_2014,
author = {N. Thakur, V. Pandey, B. Singh},
title = {An Innovational Approach to Security in Cloud Environment},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2014},
volume = {2},
Issue = {2},
month = {2},
year = {2014},
issn = {2347-2693},
pages = {52-54},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=51},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=51
TI - An Innovational Approach to Security in Cloud Environment
T2 - International Journal of Computer Sciences and Engineering
AU - N. Thakur, V. Pandey, B. Singh
PY - 2014
DA - 2014/02/28
PB - IJCSE, Indore, INDIA
SP - 52-54
IS - 2
VL - 2
SN - 2347-2693
ER -

VIEWS PDF XML
3927 3674 downloads 3728 downloads
  
  
           

Abstract

The cloud computing platform gives people the opportunity for sharing resources, services and. In the last few years, cloud computing has grown from being a promising business concept to one of the fast growing segments of the IT industry. But as more and more information on individuals and companies are placed in the cloud, concerns are beginning to grow about just how safe an environment it is. In this paper we have proposed new security architecture for cloud computing platform. This ensures secure communication system and hiding information from others. It aims at meeting all security requirements.

Key-Words / Index Term

RSA, Trusted Third Party, Security Requirements

References

[1]. R.L. Rivest, A. Shamir, and L. Adleman, �A Method for Obtaining Digital Signatures and Public-Key Cryptosystems�, Laboratory for Computer Science, Massachusetts Institute of Technology, Cam-bridge, November, 1977
[2]. Burt Kaliski, The Mathematics of the RSA Public-Key Cryptosystem, RSA Laboratories
[3]. Joan Daemen, Vincent Rijmen, �AES Proposal: Rijndael�, 1999
[4]. Joan Daemen, Vincent Rijmen, �Announcing the ADVANCED ENCRYPTION STANDARD (AES)�, Federal Information Processing Standards Publication 197, November 26, 2001
[5]. Joshua Holden, Mohammad Musa, Edward Schaefer, and Stephen Wedig, �A Simplified AES Algorithm�, January 2010
[6]. Ronald Rivest, �MD5 Message-Digest Algorithm�, rfc 1321, April 1992
[7]. Neil M.Haller, �THE S/KEY ONE-TIME PASSWORD SYSTEM�, 1993.
[8]. Neil Haller, �A One-Time Password System�, October 23, 1995
[9]. Mell, P., Grance, T., (2009). The Nist Definition of Cloud Computing. Recommendations of the National Institute of Standards and Technology. NIST special publication, 2011 National Institute of standards and technology.
[10]. Vaquero, L.M., Rodero-Merino, L., Caceres, J., Lindner, M. (2009). A Break in the Clouds: Towards a Cloud Definition. ACM SIGCOMM Computer Communication Review, 39(1), 50-55.
[11]. Strickland, J. (2011) How cloud computing works. Howstuffworks.com. Available at: computer.howstuffworks.com/cloud-computing.htm
[12]. Vouk, MA. (2008) Cloud Computing - Issues, Research and Implementations. Journal of Computing and Information Technology, 16(4), 235-246.
[13]. Buyya (2009), Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems. 25(6) 599-616.
[14]. Velte, T., Velte, J., Elsenpeter, R. (2009). Cloud Computing: A Practical Approach. McGraw-Hill Osborne Media.