International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 106 | Views: 218

Review Papers | Computer Science & Engineering | India | Volume 4 Issue 5, May 2015


Multi-Level Complex Key Sharing For Secure Access and Authorization on Cloud Platforms

Jaskarandeep Punia | Rajesh Kumar Bawa


Abstract: Cloud computing is an emerging technology used for the large, small or medium enterprise applications, which usually exchange and stores larger amount of data. The cloud computing platforms provide space to a number of applications every year, which also increases the overall user base of the cloud computing infrastructures. The cloud computing application are now also being popular in the users with the touch based portable devices like smart phones, tablet PCs, etc. The cryptographic keys are used on different communication levels of Cloud inter-node communications i. e. clients, servers and other cloud nodes. An effective corporate key management and distribution policy is required to maintain the security of the cloud environments. This research project will be based on secure key management architecture for cloud environments to enable comprehensive, trustworthy, user-verifiable, and cost-effective key management. Secure Key Exchange will protect the entire life cycle of cryptographic keys in the cloud environment. In particular, Secure Key Exchange will allow only authorized applications and/or users to use the keys. Using simple devices, administrators can remotely issue authenticated commands to Secure Key Exchange and verify system output. In this research project, we will make the Simple and Secure corporate key management technique adaptable for almost all cloud environments.


Keywords: cloud computing, cloud security, key management, secure authorization and access, multilevel keys


Edition: Volume 4 Issue 5, May 2015,


Pages: 2369 - 2372


How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link


Verification Code will appear in 2 Seconds ... Wait

Top