EST
  • Home
  • Archives
  • Volume 7
  • Number 8
  • Use of Digital Signature Standard with Station to Station Key Exchange Agreement and Cloud Manager to Enhance Security in Cloud Computing

Call for paper
April Edition 2017

International Journal of Applied Information Systems solicits high quality original research papers for the
March 15, 2017
April 2017 Edition of the journal.
The last date of research paper submission is
March 15, 2017
SUBMIT YOUR PAPER

Number 8

Use of Digital Signature Standard with Station to Station Key Exchange Agreement and Cloud Manager to Enhance Security in Cloud Computing

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive
 

PrintEmail

journal image
  • International Journal of Applied Information Systems
  • Foundation of Computer Science (FCS), NY, USA
  • Volume 7 - Number 8
  • Year of Publication:
  • Authors: Manoj Kumar, Kranti Asiwal
  • 10.5120/ijais14-451218
 Download
1524
  • Manoj Kumar and Kranti Asiwal 2014. Use of Digital Signature Standard with Station to Station Key Exchange Agreement and Cloud Manager to Enhance Security in Cloud Computing. International Journal of Applied Information Systems. 7, 8 (September 2014), 1-5. DOI=http://dx.doi.org/10.5120/ijais451218
  • @article{10.5120/ijais2017451568,
    author = {Manoj Kumar and Kranti Asiwal},
    title = {Use of Digital Signature Standard with Station to Station Key Exchange Agreement and Cloud Manager to Enhance Security in Cloud Computing},
    journal = {International Journal of Applied Information Systems},
    issue_date = {September 2014},
    volume = {7},
    number = {},
    month = {September},
    year = {2014},
    issn = {},
    pages = {1-5},
    numpages = {},
    url = {/archives/volume7/number8/672-1218},
    doi = { 10.5120/ijais14-451218},
    publisher = { xA9 2013 by IJAIS Journal},
    address = {}
    }
    
  • %1 451218
    %A Manoj Kumar
    %A Kranti Asiwal
    %T Use of Digital Signature Standard with Station to Station Key Exchange Agreement and Cloud Manager to Enhance Security in Cloud Computing
    %J International Journal of Applied Information Systems
    %@ 
    %V 7
    %N 
    %P 1-5
    %D 2014
    %I  xA9 2013 by IJAIS Journal
    

Abstract

Cloud computing provides IT as service. Cloud computing is a budding paradigm having high availability, performance, least cost and many others. Cloud is an IT environment based on which it remotely provides IT resources to users. As cloud computing is an internet based computing solution, there are lots of security breaches and vulnerabilities like authenticity, data security, confidentiality and privacy which should be dealt properly to get high performance. Different combinations are used by different researchers to tackle these security breaches and vulnerabilities, same way we have chosen a combination of authentication technique and key exchange with cloud manager. In this paper we have proposed a model to enhance security of cloud by using Station to Station key agreement for generating session key with a fixed timestamp between User and Cloud Server and then send request for any service by using Digital Signature Standard, the request message would be encrypted by using that session key which was shared earlier and once a session key is used then that session key would not be used again. So the user requires a new key for each session. All of these issues related to authentication and authorization are handled by a cloud manager present between cloud server and user.

References

  1. Mr. Prashant Rewagad and Ms. Yogita Pawar "Use of Digital Signature with Diffie Hellman Key Exchange and AES Encryption Algorithm to Enhance Data Security in Cloud Computing" 2013 IEEE International Conference on Communication Systems and Network Technologies.
  2. Uma Somani, Kanika Lakhani, Manish Mundra "Implementing Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing" 2010 IEEE 1st International Conference on Parallel, Distributed and Grid Computing (PDGC - 2010).
  3. Volker Fusenig and Ayush Sharma "Security Architecture for Cloud Networking" 2012 IEEE International Conference on Computing, Networking and Communications, Cloud Computing and Networking Symposium.
  4. Siani Pearson, Yun Shen and Miranda Mowbray "A Privacy Manager for Cloud Computing" HP Labs, Long Down Avenue, Stoke Gifford, Bristol BS34 8QZ, UK.
  5. Siani Pearson "Taking Account of Privacy when Designing Cloud Computing Services" HP Labs, Bristol, UK.
  6. Mandeep Kaur and Manish Mahajan "Using Encryption Algorithms to enhance the data security in Cloud Computing" 2013 International Journal of Communication and Computer Technologies Vol 1,issue 3,January 2013.
  7. Shabnam Sharma & Usha Mittal "Comparative analysis of various authentication techniques in Cloud Computing" International Journal of Innovative Research in Science, Engineering and Technology Vol. 2, Issue 4, April 2013.
  8. Jian Wang, Yan Zhou, Shuo Ziang & Jiajin Le "Providing Privacy Preserving in Cloud Computing" 2010 IEEE.
  9. Dave Shackleford "Cloud Security and Compliance: A Primer" SANS Whitepaper-August 2010.
  10. Joshua Browser "The Security Onion Cloud" SANS Whitepaper-2013.

Keywords

Cloud Computing, Digital Signature Standard, Station to Station key exchange.

Index Terms

Computer Science
Information Sciences