Cryptographic Protocols for Secure Cloud Computing

@article{Alhumrani2016CryptographicPF,
  title={Cryptographic Protocols for Secure Cloud Computing},
  author={S. A. Alhumrani and J. Kar},
  journal={International journal of security and its applications},
  year={2016},
  volume={10},
  pages={301-310}
}
  • S. A. Alhumrani, J. Kar
  • Published 2016
  • Computer Science
  • International journal of security and its applications
In this paper, we review and analyze some well-known cryptographic protocols for encryption of data that establish a secure communication for clouds. Many protocols are there, which provides various security goals for cloud computing. We have briefed on Secure Shell Protocol, Internet Protocol Security (IPSec), Kerberos, Wired Equivalent Privacy (WEP) and WiFi Protected Access(WPA) and discuss how these have been applied in cloud for secure communication. Further, we present the commands used… Expand
Survey Paper on CP-ABE cloud computing
TLDR
This paper proposes a hierarchical attribute based encryption which directly provides attribute value by user as well as data stored in different types of media. Expand
A Group Key based Security Model for Big Data System
TLDR
A group key based security model for Cassandra that contributes preventing Cassandra cluster from illegal outside access attempts and Cluster membership authentication and message confidentiality is provided. Expand
Curtailing the Threats to Cloud Computing in the Fourth Industrial Revolution
TLDR
This chapter concludes that with adequate enlightenment, the full benefits of cloud computing in industry 4.0 would be better enjoyed by users. Expand

References

SHOWING 1-10 OF 13 REFERENCES
A Secure Key for Cloud using Threshold Cryptography in Kerberos
TLDR
An authentication model is proposed for cloud computing based on Kerberos protocol using threshold cryptography to provide more security and to increase the availability of key to provide better security and availability to key used for cloud services. Expand
A Pragmatic Study on Different Stream Ciphers And On Different Flavors of RC4 Stream Cipher
TLDR
Different stream ciphers are discussed, some flavors of RC4 stream cipher are discussed in detail because of its wide use in various standard Protocols (Secure Socket Layer (SSL), Wi-Fi Protected Access (WPA), Wired Equivalent Privacy (WEP), etc). Expand
Elliptic Curve Cryptography for Securing Cloud Computing Applications
TLDR
Elliptic Curve Cryptography scheme is proposed as a secure tool to model a Secured platform for the Cloud Application. Expand
Elliptic Curve Cryptography for Securing Cloud Computing Applications
Computing applications and data are growing so rapidly that increasingly larger servers and data centre are needed for fast processing within the required time. A fundamental shift in the wayExpand
A User Identity Management Protocol for Cloud Computing Paradigm
TLDR
This protocol will authenticate and authorize customers/providers in other to achieve global security networks and protect customers/cloud service providers’ infrastructure by preventing unauthorized users to gain access to the service/facility. Expand
A cloud-oriented cross-domain security architecture
TLDR
The MYSEA architecture is summarized and MYSEA's approach to provide an MLS-constrained cloud computing environment is discussed, showing the feasibility of high-assurance, cross-domain services hosted within a community cloud suitable for inter-agency, or joint, collaboration. Expand
Faster Fully Homomorphic Encryption
TLDR
Two improvements to Gentry’s fully homomorphic scheme based on ideal lattices are described: a more aggressive analysis of one of the hardness assumptions and a probabilistic decryption algorithm that can be implemented with an algebraic circuit of low multiplicative degree. Expand
Formal Analysis of the EMV Protocol Suite
TLDR
This paper presents a formal model of the EMV (Europay-MasterCard-Visa) protocol suite in F# and its analysis using the protocol verification tool ProVerif in combination with FS2PV, which is the first comprehensive formal description of EMV. Expand
Cloud computing
As software migrates from local PCs to distant Internet servers, users and developers alike go along for the ride.
Design of Secure Cloud Transmission Protocol
  • International Journal of Computer Science Issues
  • 2013
...
1
2
...