Cloud security: to prevent unauthorized access using an efficient key management authentication algorithm
نویسندگان
چکیده
منابع مشابه
An Efficient ID Based Security Algorithm for Mutual Node Authentication and Key Management: An Elliptic Curve Cryptography Based Approach
The biggest challenge in the field of networking is the secured communication between the nodes within the network system; therefore it has become one of the major and attractive fields of research in computer network. The importance of Elliptic Curve Cryptography (ECC) in this field is increasing rapidly because of its smaller key size compare to other known public-key algorithms. Several user...
متن کاملAn Authentication Mechanism to Enhance Security in the Cloud Environment
Cloud is a term defined as a pool of configurable computing resources that can be accessed by users based on a pay-asyou-go principle. Cloud computing is otherwise termed as internet computing because of its availability and that will be feasible only with the internet connection. Therefore, security plays a major role in cloud computing. Some of the important security services including encryp...
متن کاملAn efficient Access Control Protocol for cloud data security using Hyper Elliptic Curve Cryptography
One of the popular area in Information Technology (IT) is Cloud computing. It provides services such as Software as a Service (SaaS), Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) in on-demand basis. Clouds are capable of servicing millions of user requests. Due to huge amount of sensitive information are stored in cloud there is a need to authorize and authenticate users ...
متن کاملResearches on Grid Security Authentication Algorithm in Cloud Computing
Focusing on multi-machine distributed computing security problems in cloud computing, the paper has proposed a grid distributed parallel authentication model based on trusted computing, which can realize simultaneous verification of grid authentication and grid behavior on upper layer of SSL and TLS protocols. Adaptive grid authentication method is established applying adaptive stream cipher fr...
متن کاملA Comprehensive Cloud Security Model with Enhanced Key Management, Access Control and Data Anonymization Features
A disgusting problem in public cloud is to securely share data based on fine grained access control policies and unauthorized key management. Existing approaches to encrypt policies and data with different keys based on public key cryptosystem are Attribute Based Encryption and proxy reencryption. The weakness behind approaches is: It cannot efficiently handle policy changes and also problem in...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Engineering & Technology
سال: 2017
ISSN: 2227-524X
DOI: 10.14419/ijet.v7i1.1.10787