Multi-Level Complex Key Sharing For Secure Access and Authorization on Cloud Platforms
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064


Amazon Sale


Review Papers | Computer Science & Engineering | India | Volume 4 Issue 5, May 2015

Multi-Level Complex Key Sharing For Secure Access and Authorization on Cloud Platforms

Jaskarandeep Punia, Rajesh Kumar Bawa

Cloud computing is an emerging technology used for the large, small or medium enterprise applications, which usually exchange and stores larger amount of data. The cloud computing platforms provide space to a number of applications every year, which also increases the overall user base of the cloud computing infrastructures. The cloud computing application are now also being popular in the users with the touch based portable devices like smart phones, tablet PCs, etc. The cryptographic keys are used on different communication levels of Cloud inter-node communications i.e. clients, servers and other cloud nodes. An effective corporate key management and distribution policy is required to maintain the security of the cloud environments. This research project will be based on secure key management architecture for cloud environments to enable comprehensive, trustworthy, user-verifiable, and cost-effective key management. Secure Key Exchange will protect the entire life cycle of cryptographic keys in the cloud environment. In particular, Secure Key Exchange will allow only authorized applications and/or users to use the keys. Using simple devices, administrators can remotely issue authenticated commands to Secure Key Exchange and verify system output. In this research project, we will make the Simple and Secure corporate key management technique adaptable for almost all cloud environments.

Keywords: cloud computing, cloud security, key management, secure authorization and access, multilevel keys

Edition: Volume 4 Issue 5, May 2015

Pages: 2369 - 2372

Share this Article

How to Cite this Article?

Jaskarandeep Punia, Rajesh Kumar Bawa, "Multi-Level Complex Key Sharing For Secure Access and Authorization on Cloud Platforms", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB154828, Volume 4 Issue 5, May 2015, 2369 - 2372

62 PDF Views | 46 PDF Downloads

Download Article PDF


Amazon Sale


Similar Articles with Keyword 'cloud computing'

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1028 - 1031

Secure and Efficient Item Information Retrieval in Cloud Computing

Dr. Shameem Akther, Tahseen Begum

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 735 - 737

Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks

Nikhita Nerkar, Vina M Lomte

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 315 - 318

Cloud Computing - A Bird's Eye View

S.Kalaiselvi, S.V.Revathi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1724 - 1727

Privacy Preserving Authenticity Framework for Shared Data Cloud Network

P. Vanitha Sree, K. Narayana Rao

Share this Article

Similar Articles with Keyword 'cloud security'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 735 - 737

Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks

Nikhita Nerkar, Vina M Lomte

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 511 - 516

Graph-based Attack Detection in Cloud using KDD CUP 99 Dataset

Swapnali G. Game, S. B. Natikar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2543 - 2546

A Survey on Security Issues and Attacks in Cloud Environment

Varsha Narole, Anil Jaiswal, Narendra Narole

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1721 - 1723

A Survey and Implementation of Trusted Multi Level SAAS (Security as a Service) Cloud

Papineni. Kalpana, K. Narayana Rao

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1215 - 1219

Secure Query Processing of Outsourced Data Using Privacy Homomorphism: kNN and Distance Decoding Algorithm

Rupali S. Khachane

Share this Article

Similar Articles with Keyword 'key management'

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2369 - 2372

Multi-Level Complex Key Sharing For Secure Access and Authorization on Cloud Platforms

Jaskarandeep Punia, Rajesh Kumar Bawa

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1255 - 1257

Designing an Improved KISS Environment

Mohinder Singh, Harmandeep Singh

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1191 - 1196

Lightweight Key Distribution for Secure Routing and Secure Information Propagation

Anubha Goyal, Geetanjali Babbar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1345 - 1348

A Survey on Security Frameworks for Cluster Based Wireless Sensor Networks

Shital Mane, Madhav Ingle

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 1951 - 1957

Energy Efficient Cluster Based Technique for Resource Allocation in MANET

R. Preethi, Dr. R. Anbuselvi

Share this Article
Top