Full Paper View Go Back

A Systematic Approach for Ensuring Security and Efficiency in Cloud Computing

Vineet Chaturvedi1 , Ashok Verma2 , Neha Agarwal3

Section:Research Paper, Product Type: Isroset-Journal
Vol.1 , Issue.5 , pp.16-20, Sep-2013


Online published on Oct 30, 2013


Copyright © Vineet Chaturvedi, Ashok Verma , Neha Agarwal . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Vineet Chaturvedi, Ashok Verma , Neha Agarwal, “A Systematic Approach for Ensuring Security and Efficiency in Cloud Computing,” International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.5, pp.16-20, 2013.

MLA Style Citation: Vineet Chaturvedi, Ashok Verma , Neha Agarwal "A Systematic Approach for Ensuring Security and Efficiency in Cloud Computing." International Journal of Scientific Research in Computer Science and Engineering 1.5 (2013): 16-20.

APA Style Citation: Vineet Chaturvedi, Ashok Verma , Neha Agarwal, (2013). A Systematic Approach for Ensuring Security and Efficiency in Cloud Computing. International Journal of Scientific Research in Computer Science and Engineering, 1(5), 16-20.

BibTex Style Citation:
@article{Chaturvedi_2013,
author = {Vineet Chaturvedi, Ashok Verma , Neha Agarwal},
title = {A Systematic Approach for Ensuring Security and Efficiency in Cloud Computing},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {9 2013},
volume = {1},
Issue = {5},
month = {9},
year = {2013},
issn = {2347-2693},
pages = {16-20},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=83},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=83
TI - A Systematic Approach for Ensuring Security and Efficiency in Cloud Computing
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Vineet Chaturvedi, Ashok Verma , Neha Agarwal
PY - 2013
DA - 2013/10/30
PB - IJCSE, Indore, INDIA
SP - 16-20
IS - 5
VL - 1
SN - 2347-2693
ER -

4485 Views    4285 Downloads    4134 Downloads
  
  

Abstract :
Cloud Computing is the latest trend of today’s IT industries. It is the solution for the problem that occurs due to the resources availability and its utilization over the network. The popularity of cloud computing has increased due to its great policy of pay-as-you-use or resource-on-demand but still it lacks with certain issues of security, trust and efficiency when implemented or deployed on large enterprise such as in geological surveys, scientific applications, astrological applications, oceanography etc. There exist lots of solution in security issues and lots of research for its efficiency but none of them focus on the both issues together. In this paper we have proposed a model that will provide solution for both of these issues. The work mainly focus on the fast scheduling of events in cloud computing by using private key cryptosystem instead of public key cryptosystem and instead of using traditional IKE i.e. internet key exchange mechanism we used the concept of random key reusability which is an approach for providing authenticate and efficient key exchange as that of IKE. Also the various section are made for storing users data on basis of the confidentiality, authentication and integrity that will enhance the overall security of the data stored and retrieved in the cloud computing.

Key-Words / Index Term :
CLC, IKE, Certification Authority, Sensitivity Rating, Random Key Reusability

References :
[1]. Dimitrios Zissis, Dimitrios Lekkas “Addressing cloud computing security issues” Future Generation Computer Systems, Elsevier, 2012.
[2]. Rabai, L.B.A. et al., A cyber security model in cloud computing environments. Journal of King Saud University – Computer and Information Sciences (2012).
[3]. Rong C et al. Beyond lightning: A survey on security challenges in cloud computing. Comput Electr Eng (2012)
[4]. Shivlal Mewada, Umesh Kumar Singh and Pradeep Kumar Sharma, " Security Enhancement in Cloud Computing (CC)”, ISROSET- IJSRCSE, Vol-1, Issue-1, pp(31-37), Jan-Feb 2013
[5]. Shivlal Mewada, Umesh Kumar Singh, Pradeep Sharma,“Security Based Model for Cloud Computing”, Int. Journal of Computer Networks and Wireless Communications (IJCNWC), Vol. 1, No. 1, pp (13-19), December 2011.
[6]. R. Buyya, C.S. Yeo, S. Venugopal, J. Broberg, I. Brandic, Cloud computing and emerging it platforms: vision, hype, and reality for delivering computing as the 5th utility, Future Generation Computer Systems 25 (2009) 599–616.
[7]. Cong Wang, Qian Wang, and Kui Ren, Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing, IEEE INFOCOM 2010.
[8]. I.M. Abbadi, M. Alawneh / Computers and Electrical Engineering 38 (2012) 1073–1087
[9]. S. Marston et al. / Decision Support Systems 51 (2011) 176–189
[10]. Shuai Zhang and Shufen Zhang “Cloud Computing Research and Development Trend”, IEEE, Second International Conference on Future Networks, 2010
[11]. K. Salah ,J. M. Alcaraz-Calero,S. Zeadally ,S. Almulla and M. Alzaabi “Using Cloud Computing to Implement a Security Overlay Network”, IEEE, Security and Privacy, 2011
[12]. S. Marston et al.,Decision Support Systems 51 (2011)
[13]. National Institute of Standards and Technology. The NIST definition of cloud computing; 2011.http://www.nist.gov/itl/cloud/upload/cloud-defv15. pdf
[14]. J. Yao, S. Chen, S. Nepal, D. Levy, J. Zic, Truststore: making Amazon S3 trustworthy with services composition, in: Proceedings of the 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, CCGRID’08, Melbourne, Australia, 2010, pp. 600–605
[15]. N. Cao, Z. Yang, C. Wang, K. Ren, W. Lou, Privacy-preserving query over encrypted graph-structured data in cloud computing, in: IEEE International Conference on Distributed ComputingSystems, ICDCS’11, 2011, pp. 393–402.
[16]. Pradeep Bhosale, Priyanka Deshmukh, Girish Dimbar, Ashwin iDeshpande: Enhancing Data Security in Cloud Computing Using 3D Framework & Digital Signature with Encryption-International Journal of Engineering Research & Technology (IJERT), Vol. 1 Issue 8, October – 2012
[17]. F. Hu, M. Qiu, J. Li, T. Grant, D. Tylor, S. Mccaleb, L. Butler, R. Hamner, A Review on Cloud Computing : Design Challenges in Architecture and Security, Journal of Computing and Information Technology, 19 (1) (2011)
[18]. A. Groce, J. Katz, A new framework for efficient password-based authenticated key exchange, in: Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS’10, Chicago, USA, 2010, pp. 516–525

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation