Review Papers | Computer Science & Engineering | India | Volume 4 Issue 5, May 2015
Multi-Level Complex Key Sharing For Secure Access and Authorization on Cloud Platforms
Jaskarandeep Punia, Rajesh Kumar Bawa
Cloud computing is an emerging technology used for the large, small or medium enterprise applications, which usually exchange and stores larger amount of data. The cloud computing platforms provide space to a number of applications every year, which also increases the overall user base of the cloud computing infrastructures. The cloud computing application are now also being popular in the users with the touch based portable devices like smart phones, tablet PCs, etc. The cryptographic keys are used on different communication levels of Cloud inter-node communications i.e. clients, servers and other cloud nodes. An effective corporate key management and distribution policy is required to maintain the security of the cloud environments. This research project will be based on secure key management architecture for cloud environments to enable comprehensive, trustworthy, user-verifiable, and cost-effective key management. Secure Key Exchange will protect the entire life cycle of cryptographic keys in the cloud environment. In particular, Secure Key Exchange will allow only authorized applications and/or users to use the keys. Using simple devices, administrators can remotely issue authenticated commands to Secure Key Exchange and verify system output. In this research project, we will make the Simple and Secure corporate key management technique adaptable for almost all cloud environments.
Keywords: cloud computing, cloud security, key management, secure authorization and access, multilevel keys
Edition: Volume 4 Issue 5, May 2015
Pages: 2369 - 2372
How to Cite this Article?
Jaskarandeep Punia, Rajesh Kumar Bawa, "Multi-Level Complex Key Sharing For Secure Access and Authorization on Cloud Platforms", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB154828, Volume 4 Issue 5, May 2015, 2369 - 2372
102 PDF Views | 78 PDF Downloads
Similar Articles with Keyword 'cloud computing'
Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018
Pages: 81 - 84Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey
Priyanka H, Dr. Mary Cherian
Review Papers, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021
Pages: 594 - 596A Review of Replication Strategies to Increase Data Availability for Data Intensive Applications in Cloud
K. Sreelatha
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013
Pages: 71 - 73Cloud Computing and Its Types in Mobile Network
Palak Jain
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013
Pages: 315 - 318Cloud Computing - A Birds Eye View
S.Kalaiselvi, S.V.Revathi
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020
Pages: 1028 - 1031Secure and Efficient Item Information Retrieval in Cloud Computing
Dr. Shameem Akther, Tahseen Begum
Similar Articles with Keyword 'cloud security'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2619 - 2622Information Security in Multi-Cloud Environment
Digambar D. Patil, Megha Singh
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 735 - 737Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks
Nikhita Nerkar, Vina M Lomte
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1259 - 1361Security Service Model for Cloud Environment
Shafali Gupta, Neha R Gedam
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 1845 - 1848A Cloud Storage System for Preserving Privacy and Data Integrity of User
M. S. Tore, S. K. Sonkar
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2369 - 2372Multi-Level Complex Key Sharing For Secure Access and Authorization on Cloud Platforms
Jaskarandeep Punia, Rajesh Kumar Bawa
Similar Articles with Keyword 'key management'
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1812 - 1814A Survey on Deduplication Scheme in Cloud Storage
Deepa.D, Revathi.M
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 3273 - 3277Homomorphic Encryption & A Novel Key Management Technique to Support Data Aggregation in Mobile Sensing
Farhat Afshan, Shameem Akther
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1255 - 1257Designing an Improved KISS Environment
Mohinder Singh, Harmandeep Singh
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2369 - 2372Multi-Level Complex Key Sharing For Secure Access and Authorization on Cloud Platforms
Jaskarandeep Punia, Rajesh Kumar Bawa
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 781 - 785Implementation of Fast Transmission to Remote Cooperative Groups: A New Key Management Scenario in Wireless Sensor Networks
P. Harikrishna, K. V. Srinivasa Rao