Open Access   Article Go Back

Cloud Security System With Sequel Homomorphic Encryption and Diffie-Hellman Algorithm

K Kuppuswamy1 , M.R. Nagarajan2

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-02 , Page no. 117-120, Jan-2019

Online published on Jan 31, 2019

Copyright © K Kuppuswamy, M.R. Nagarajan . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: K Kuppuswamy, M.R. Nagarajan, “Cloud Security System With Sequel Homomorphic Encryption and Diffie-Hellman Algorithm,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.02, pp.117-120, 2019.

MLA Style Citation: K Kuppuswamy, M.R. Nagarajan "Cloud Security System With Sequel Homomorphic Encryption and Diffie-Hellman Algorithm." International Journal of Computer Sciences and Engineering 07.02 (2019): 117-120.

APA Style Citation: K Kuppuswamy, M.R. Nagarajan, (2019). Cloud Security System With Sequel Homomorphic Encryption and Diffie-Hellman Algorithm. International Journal of Computer Sciences and Engineering, 07(02), 117-120.

BibTex Style Citation:
@article{Kuppuswamy_2019,
author = {K Kuppuswamy, M.R. Nagarajan},
title = {Cloud Security System With Sequel Homomorphic Encryption and Diffie-Hellman Algorithm},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2019},
volume = {07},
Issue = {02},
month = {1},
year = {2019},
issn = {2347-2693},
pages = {117-120},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=659},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=659
TI - Cloud Security System With Sequel Homomorphic Encryption and Diffie-Hellman Algorithm
T2 - International Journal of Computer Sciences and Engineering
AU - K Kuppuswamy, M.R. Nagarajan
PY - 2019
DA - 2019/01/31
PB - IJCSE, Indore, INDIA
SP - 117-120
IS - 02
VL - 07
SN - 2347-2693
ER -

           

Abstract

A set of resources and services offered over the Internet, is called cloud computing. These computing services are delivered from data centers located across the world. Cloud computing consumers benefited by providing virtual resources via internet such as Platform, Infrastructure and Software as a Service. The consequential challenge in cloud computing are the privacy and security issues caused by its multi-tenancy nature and the outsourcing of infrastructure, sensitive data. It is available on Pay-Per-Use model. Various malicious activities from illegal users have threatened this technology such as data misuse, inflexible access control mechanism. The occurrence of these threats may result into spoil or illegal access of critical and private data of end user and business user. In this paper, we identify the most vulnerable security issues or attribute in cloud computing architecture, which will enable both end users and vendors to know about the key security threats associated with cloud computing and propose relevant solution directives to strengthen security in the cloud computing environment. We propose secure cloud architecture by using sequel homomorphic encryption scheme with diffie-hellman algorithm for organizations to strengthen the security mechanism.

Key-Words / Index Term

References

[1] Aditi Soral, “Achieving Fully Homomorphic Encryption in Security -A Survey”, SSRG International Journal of Computer Science and Engineering (SSRG-IJCSE) , Vol.3, Issue.2, pp. 2348 – 8387.
[1] Anjana Chaudhary, Ravinder Thakur, Manish Mann “Security In Cloud Computing By Using Sequel Homomorphic Encryption Scheme With Diffie-Hellman Algorithm”, International Journal of Advanced Computational Engineering and Networking, Vol.2, Issue.10, pp. 2320-2106.
[2] Umer Khalida,Abdul Ghafoor, Misbah Irum, Muhammad Awais Shibli “Cloud based Secure and Privacy Enhanced Authentication & Authorization Protocol”, ScienceDirect, Procedia Computer Scurity, pp 22(2103) 680 – 688
[3] Kashif Munir1, Dr. Sellapan Palaniappan, “Secure Cloud Architecture”, International Journal of Advanced Computing Vol.4, Issue.1.
[4] Tim Mather, Subra Kumaraswamy, Shahed Latif Cloud Security and Privacy: An Enterprise perspective of Risks and Compliance, O`Reilly Media, Inc.,2009.
[5] L.Arockiam,S.Monikandan & G.Parthasarathy “Cloud Computing: A Survey” http://interscience.in/IJIC_Vol1Iss2/paper5.pdf
[6] Anitha Y “Security Issues in Cloud Computing - A Review” in International Journal of Thesis Projects and Dissertations (IJTPD) Vol. 1, Issue 1, PP: (1-6),Month: October-December 2013.
[7] R. Kalaichelvi Chandrahasan, S Shanmuga Priya and Dr. L. Arockiam “Research Challenges and Security Issues in Cloud Computing” in International Journal of Computational Intelligence and Information Security, March 2012 Vol. 3, No. 342