CFP last date
15 May 2024
Call for Paper
June Edition
IJAIS solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 15 May 2024

Submit your paper
Know more
Reseach Article

Use of Digital Signature Standard with Station to Station Key Exchange Agreement and Cloud Manager to Enhance Security in Cloud Computing

by Manoj Kumar, Kranti Asiwal
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 7 - Number 8
Year of Publication: 2014
Authors: Manoj Kumar, Kranti Asiwal
10.5120/ijais14-451218

Manoj Kumar, Kranti Asiwal . Use of Digital Signature Standard with Station to Station Key Exchange Agreement and Cloud Manager to Enhance Security in Cloud Computing. International Journal of Applied Information Systems. 7, 8 ( September 2014), 1-5. DOI=10.5120/ijais14-451218

@article{ 10.5120/ijais14-451218,
author = { Manoj Kumar, Kranti Asiwal },
title = { Use of Digital Signature Standard with Station to Station Key Exchange Agreement and Cloud Manager to Enhance Security in Cloud Computing },
journal = { International Journal of Applied Information Systems },
issue_date = { September 2014 },
volume = { 7 },
number = { 8 },
month = { September },
year = { 2014 },
issn = { 2249-0868 },
pages = { 1-5 },
numpages = {9},
url = { https://www.ijais.org/archives/volume7/number8/672-1218/ },
doi = { 10.5120/ijais14-451218 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T18:55:23.233135+05:30
%A Manoj Kumar
%A Kranti Asiwal
%T Use of Digital Signature Standard with Station to Station Key Exchange Agreement and Cloud Manager to Enhance Security in Cloud Computing
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 7
%N 8
%P 1-5
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing provides IT as service. Cloud computing is a budding paradigm having high availability, performance, least cost and many others. Cloud is an IT environment based on which it remotely provides IT resources to users. As cloud computing is an internet based computing solution, there are lots of security breaches and vulnerabilities like authenticity, data security, confidentiality and privacy which should be dealt properly to get high performance. Different combinations are used by different researchers to tackle these security breaches and vulnerabilities, same way we have chosen a combination of authentication technique and key exchange with cloud manager. In this paper we have proposed a model to enhance security of cloud by using Station to Station key agreement for generating session key with a fixed timestamp between User and Cloud Server and then send request for any service by using Digital Signature Standard, the request message would be encrypted by using that session key which was shared earlier and once a session key is used then that session key would not be used again. So the user requires a new key for each session. All of these issues related to authentication and authorization are handled by a cloud manager present between cloud server and user.

References
  1. Mr. Prashant Rewagad and Ms. Yogita Pawar "Use of Digital Signature with Diffie Hellman Key Exchange and AES Encryption Algorithm to Enhance Data Security in Cloud Computing" 2013 IEEE International Conference on Communication Systems and Network Technologies.
  2. Uma Somani, Kanika Lakhani, Manish Mundra "Implementing Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing" 2010 IEEE 1st International Conference on Parallel, Distributed and Grid Computing (PDGC - 2010).
  3. Volker Fusenig and Ayush Sharma "Security Architecture for Cloud Networking" 2012 IEEE International Conference on Computing, Networking and Communications, Cloud Computing and Networking Symposium.
  4. Siani Pearson, Yun Shen and Miranda Mowbray "A Privacy Manager for Cloud Computing" HP Labs, Long Down Avenue, Stoke Gifford, Bristol BS34 8QZ, UK.
  5. Siani Pearson "Taking Account of Privacy when Designing Cloud Computing Services" HP Labs, Bristol, UK.
  6. Mandeep Kaur and Manish Mahajan "Using Encryption Algorithms to enhance the data security in Cloud Computing" 2013 International Journal of Communication and Computer Technologies Vol 1,issue 3,January 2013.
  7. Shabnam Sharma & Usha Mittal "Comparative analysis of various authentication techniques in Cloud Computing" International Journal of Innovative Research in Science, Engineering and Technology Vol. 2, Issue 4, April 2013.
  8. Jian Wang, Yan Zhou, Shuo Ziang & Jiajin Le "Providing Privacy Preserving in Cloud Computing" 2010 IEEE.
  9. Dave Shackleford "Cloud Security and Compliance: A Primer" SANS Whitepaper-August 2010.
  10. Joshua Browser "The Security Onion Cloud" SANS Whitepaper-2013.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Digital Signature Standard Station to Station key exchange.