Secure Cloud Simulation Using Hybrid Algorithm

Research Area: Volume 9,Issue 6,Nov.,2020 Year: 2020
Type of Publication: Article Keywords: Authentication, Data Leakage, Distributed Denial of Service, Elliptical Curve Cryptography and Symmetric Key Algorithm
Authors:
  • B. Reena
  • P. Divya
  • I. Jasmine Selvakumari Jeya
Journal: IJEIR Volume: 9
Number: 6 Pages: 202-211
Month: November
ISSN: 2277-5668
Abstract:
At present, data security and privacy has been regarded as one of the biggest concerns in cloud computing. Data stored remotely is vulnerable and susceptible to threats. Due to this, users do not trust their data over the cloud. Cloud consumers want an assurance that they can access their data wherever they want without anyone else’s manipulation. Moreover, authentication of users over the cloud is another important factor to consider. After conducting surveys and studying various research papers it is found that the major security concerns of cloud computing includes Data leakage, Distributed Denial of Service (DDOS). The data security can be improvised by implementing various symmetric key algorithms so that data on the server is stored in such a manner that even if a person can access the data, they can't view the original data, as it needs to be decrypted. Including storage security, authorized access of users also helps in avoiding DDOS as only genuine users will have access to the cloud. A hybrid model, a mixture between elliptical curve cryptography and symmetric key algorithm in which ECC is used for user verification and to keep the private data secure while AES algorithm is used to allow the user to store and access their data securely in the cloud by encrypting the data on the client side and decrypting the data after downloading from the cloud. Since the private key is owned by the user of the data, none can decrypt the data, even if hackers get their hands on the data. Moreover, the user will securely authenticate themselves by using various input parameters at the time of login to the cloud server. The whole prototype of the proposed solution would benefit by enabling a proper access mechanism to avoid unauthorized access to the information system and secure storage to allow access of data.

Indexed By:

Our Journals

IJECCE
International Journal of Electronics Communication and Computer Engineering
ISSN(Online): 2249 - 071X
ISSN (Print) : 2278 – 4209
www.ijecce.org
Submissions open
IJAIR
International Journal of Agriculture Innovations and Research
ISSN(Online) : 2319 – 1473
www.ijair.org
Submissions open
IJISM
International Journal of Innovation in Science and Mathematics
ISSN : 2347 – 9051
www.ijism.org
Submissions open
IJEIR
International Journal of Engineering Innovations and Research
ISSN(Online) : 2277 – 5668
www.ijeir.org
Submissions are open.

IJAIM
International Journal of Artificial Intelligence and Mechatronics
ISSN(Online) : 2320 – 5121
www.ijaim.org
Submissions open
IJRAS
International Journal of Research in Agricultural Sciences
ISSN(Online) : 2348 – 3997
www.ijras.org
Submissions open

Submission Open

"Submissions Open For Vol. 14,Issue 1, Jan. - Feb., 2025"

Click here to submit article.........

Latest Updates

Submissions open

Submissions open

For

"Vol. 14,Issue 1, Jan. - Feb., 2025"


 
Published Papers

Accepted Papers are published in

1. Recently Published Issue.


 

Dear Authors

Once author receives paper id, please always mention it in subject of your mail.

"Submissions Open"

Message for Authors