首页> 外文期刊>International Arab Journal of e-Technology >Resource Sharing Security in Cloud Computing Environment
【24h】

Resource Sharing Security in Cloud Computing Environment

机译:云计算环境中的资源共享安全性

获取原文
           

摘要

Although Cloud Computing is a great innovation in the world of computing, there also exist downsides of cloud computing. These most important challenges are Security & Privacy of data on the cloud, check availability of data on the cloud. For these problems, Data storage security refers to the security of data on the storage media. Security is an important factor in cloud computing for ensuring clients data is placed on the secure mode in the cloud. The third party must not be stealing Data so authentication of client becomes a mandatory task. Security is very essential for applications where the sensitive data is transmitted. On the other hand, the encryption methods with minimal key size and minimal computations have to be selected as energy efficiency is also limitation of mobile applications. Therefore, there is a great need of encryption method with high levels of security and with minimal key size. Traditional Symmetric or Asymmetric encryption algorithms can be used for cloud computing to provide three cryptographic primitives, integrity, confidentiality and authentication. There are many drawbacks for Symmetric encryption algorithms such as key maintenance is a great problem faced in symmetric encryption methods and less security, level is the problem of asymmetric encryption methods even though key maintenance is easy. And there are many drawbacks of Asymmetric encryption algorithms such as those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. There for, the main target for ensuring security is to developed new hybrid cryptography protocol. This new security protocol using combination of both symmetric and asymmetric cryptographic techniques is proposed by merging both symmetric and asymmetric techniques by a way that avoids the disadvantages of the existing hybrid protocols. We developed Five new hybrid cryptography protocol for achieving security in Mobile Cloud Computing. In proposed proto col the plain text divided into two parties, the first part is encrypted using encryption scheme and the second part encrypted using anther encryption scheme. These two schemes have occurred simultaneously so that the time required making encryption to all plain text is small because two schemes done in parallel way. We can obtain much security with a little time in this proposed protocol. The Proposed protocol has been proposed to achieve the security services such as Authentication, Confidentiality, Integrity, Non-Repudiation and Availability. The results show the superiority of NH CP algorithms over other algorithms in terms of the encryption and decryption time, processing time, and throughput.
机译:尽管云计算是计算领域的一项伟大创新,但云计算也存在弊端。这些最重要的挑战是云上数据的安全性和隐私性,检查云上数据的可用性。对于这些问题,数据存储安全性是指存储介质上数据的安全性。安全性是云计算中确保客户端数据放置在云中安全模式下的重要因素。第三方一定不能窃取数据,以便客户端身份验证成为强制性任务。对于传输敏感数据的应用程序,安全性至关重要。另一方面,必须选择具有最小密钥大小和最少计算量的加密方法,因为能源效率也是移动应用程序的限制。因此,非常需要具有高安全性和最小密钥大小的加密方法。传统的对称或非对称加密算法可用于云计算,以提供三种加密原语,完整性,机密性和身份验证。对称加密算法有很多缺点,例如,密钥维护是对称加密方法中面临的一个大问题,并且安全性较低;即使密钥维护很容易,级别也是非对称加密方法的问题。而且非对称加密算法有很多缺点,例如那些算法消耗大量计算资源,例如CPU时间,内存和电池电量。因此,确保安全性的主要目标是开发新的混合加密协议。通过合并对称和非对称技术,从而避免了现有混合协议的缺点,提出了使用对称和非对称密码技术相结合的新安全协议。我们开发了五种新的混合加密协议,以实现移动云计算的安全性。在提议的协议中,将纯文本分为两部分,第一部分使用加密方案加密,第二部分使用其他加密方案加密。这两种方案同时发生,因此对所有纯文本进行加密所需的时间很小,因为两种方案是并行进行的。在此提议的协议中,我们可以花很少的时间获得很多安全性。已经提出了所提议的协议以实现诸如认证,机密性,完整性,不可否认性和可用性的安全服务。结果表明,在加密和解密时间,处理时间和吞吐量方面,NH CP算法优于其他算法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号