International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 130 | Views: 244

Review Papers | Computer Science & Engineering | India | Volume 4 Issue 9, September 2015 | Popularity: 6.4 / 10


     

Multi-Level Cryptographic Key Sharing For Secure Access and Authorization on Cloud Platforms - A Review

Kuldeep Singh, Er. Amardeep Kaur


Abstract: Cloud computing is attracting the large user bases and now-a-days hosting the large sized application with heavy and complex calculation load. The cloud computing platforms are because being popular and user at large scales, they are also being favorite targets of the hacking groups. Some cloud computing application carry secure and personal data, which may affect the social image, security or economics of a nation, personnel, organization or other similar entities. Hence, there is always a strong requirement of the secure authorization & request and data exchange model. The security is continuous process, and the models are kept changing from time to time. Effective & Secure key management and distribution scheme play an important role for the data security in Cloud Computing. The cryptographic keys are used on different communication levels of Cloud Computing communications i. e. neighbor nodes, cluster heads and base stations. We proposed a new model presents improved key management architecture, called multi-level complex key exchange and authorizing model (Multi-Level CK-EAM) for the Cloud Computing, to enable comprehensive, trustworthy, user-verifiable, and cost-effective key management. In this research, we will develop the proposed scheme named Multi-Level CK-EAM for corporate key management technique adaptable for the Cloud Computing platforms by making them integral and confidential. To add more security, there is a next step which includes Captcha, user has to fill the correct given Captcha which eliminates the possibility of robot, botnet etc. In addition, it also has to be created in way to work efficiently with Cloud nodes, which means it must use less computational power of the Cloud computing platforms.


Keywords: Cloud Storage, Data Security, Data Encryption, Cryptographic keys, Security Attacks, Cloud Computing


Edition: Volume 4 Issue 9, September 2015


Pages: 152 - 154



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Kuldeep Singh, Er. Amardeep Kaur, "Multi-Level Cryptographic Key Sharing For Secure Access and Authorization on Cloud Platforms - A Review", International Journal of Science and Research (IJSR), Volume 4 Issue 9, September 2015, pp. 152-154, https://www.ijsr.net/getabstract.php?paperid=SUB157923

Similar Articles

Downloads: 2

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Downloads: 7 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article, Computer Science & Engineering, United States of America, Volume 13 Issue 3, March 2024

Pages: 422 - 426

Enhancing Cybersecurity in Cloud - Based Banking - Best Practices and Technologies

Ravi Jagadish

Share this Article

Downloads: 102

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2203 - 2208

Review on MANETs Characteristics, Challenges, Application and Security Attacks

Anuj Rana, Sandeep Gupta

Share this Article

Downloads: 103

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1565 - 1567

A Region Boundaries Algorithm for Ear Authentication Based on Plots

G. Harsha Vardhan, K. Jeeva

Share this Article

Downloads: 103

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016

Pages: 1885 - 1890

A Proposed Paper for D-Scrabble Physical Layer Security Model Integrated with AI

Devansh Dave

Share this Article
Top