MSRCC – Mitigation of Security Risks in Cloud Computing

  • D. Chandramohan
  • T. Vengattaraman
  • M. S. S. Basha
  • P. Dhavachelvan
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 176)

Abstract

Cloud computing represents the latest phase in the evolution of Internet-based computing. In spite of the attractive properties it provides, security and privacy issues loom large for cloud computing. In this paper, we concentrate on the security threats involved in cloud by providing an Authenticated Key Exchange Protocol (AKExP). In this protocol, we make use of the identity management scheme and symmetric key encryption algorithm so that unauthorized users cannot get access to the sensitive data stored in the cloud. This proposed approach minimizes the computation cost and communication cost when compared with another authentication protocol, Identity-based Authentication Protocol. This paper provides an efficient and secure way to authenticate the user in the cloud both by the owner and cloud service provider.

Keywords

Cloud Request Dispatcher Symmetric Encryption Key Exchange Cloud Security 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Li, H., Dai, Y., Tian, L., Yang, H.: Identity-Based Authentication for Cloud Computing. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) Cloud Computing. LNCS, vol. 5931, pp. 157–166. Springer, Heidelberg (2009)Google Scholar
  2. 2.
    Identiy Based Cryptography for Cloud Security, http://eprint.iacr.org/11/169
  3. 3.
    Crampton, J., Lim, H.W., Paterson, K.G.: What can Identity-Based Cryptography offer to Web Services? In: SWS 2007: Proc. of the 2007 ACM Workshop on Secure Web Services, pp. 26–36. ACM (2007)Google Scholar
  4. 4.
    Amazon Elastic Compute Cloud, http://aws.amazon.com/ec2 (access on October 2009)
  5. 5.
    IBM Blue Cloud project, http://www-03.ibm.com/press/us/en/pressrelease/22613.wss/ (access on October 2009)
  6. 6.
    Abawajy, J.: Determining Service Trustworthiness in InterCloud Computing Environments. In: 10th International Symposium on Pervasive Systems, Algorithms and Networks (I-SPAN 2009), pp. 784–788 (2009)Google Scholar
  7. 7.
    Kang, L., Zhang, X.: Identity-Based Authentication in Cloud Storage Sharing. In: IEEE International Conference on Multimedia Information Networking and Security, pp. 851–855 (2010)Google Scholar
  8. 8.
    Nanda Kishore, M.S., Jayakumar, S.K.V., Satya Reddy, G., Dhavachelvan, P., Chandramohan, D., Soumya Reddy, N.P.: Web Service Suitability Assessment for Cloud Computing. In: Wyld, D.C., Wozniak, M., Chaki, N., Meghanathan, N., Nagamalai, D. (eds.) NeCoM 2011, WeST 2011, WiMoN 2011. CCIS, vol. 197, pp. 622–632. Springer, Heidelberg (2011)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • D. Chandramohan
    • 1
  • T. Vengattaraman
    • 1
  • M. S. S. Basha
    • 1
  • P. Dhavachelvan
    • 1
  1. 1.Department of Computer SciencePondicherry UniversityPondicherryIndia

Personalised recommendations