A COMPREHENSIVE STUDY OF CRYPTOGRAPHY AND KEY MANAGEMENT BASED SECURITY IN CLOUD COMPUTING

Authors

  • S. Vinothkumar
  • J. Amutharaj
  • S. Jeyabalan

Keywords:

Cloud Computing, Cryptography, Key Management.

Abstract

Cloud computing is a cost effective flexible and proven delivery platform for providing consumer IT services or business services over internet. It has an ability to provide many services over internet. It not only provides computing services but additional computing resources. To interact with various services in the cloud and to store retrieve data from cloud several security mechanism is required. Cryptography and key management mechanism are one of the import services in the cloud to secure data. In this context, this paper investigates the basic problem of cloud computing with cryptography and key management system for enabling support of interoperability between cloud cryptography client and key management services.

Downloads

Download data is not yet available.

References

.Si Han, Ke Han, and Shouyi hang, A Data Sharing Protocol to Minimize Security and Privacy Risks of Cloud Storage in Big Data Era, IEEE Access, volume 7, 2019.

. Jinan Shen,Xuejian Deng, Zhenwu Xu, Multi-security-level cloud storage system based on Improved Proxy re-encryption,https://doi.org/10.1186/s13638-019-1614-y, springer, 2019.

.Shengmin Xu, Guomin Yang, Yi Muc, Ximeng Liu, A secure IoT cloud storage system with fine- grained access control and decryption key exposure resistance, Future Generation Computer Systems 97, Elsevier, (2019) 284–294.

. Kwangsu Lee, Ciphertext Outdate Attacks on the Revocable Attribute-Based Encryption Scheme with Time Encodings, DOI 10.1109/2953300, IEEE Access, 2019.

.Rashad Elhabob,Yanan Zhao,Iva Sella, and Hu Xiong, Efficient Certificateless Public Key Cryptography with Equality Test for Internet of Vehicles, IEEE Access,Volume 7, 2019.

.Shakkeera L , Saranya A,Sharmasth ValiY,SecureCollaborative Key Management System for Mobile Cloud Data Storage, International Journal of Engineering and Advanced Technology (IJEAT), Volume-8 Issue-5S3, July, 2019.

.Jing Wang, Libing Wu, Kim-Kwang Raymond Choo, Debiao He, Blockchain Based Anonymous Authentication with Key Management for Smart Grid Edge Computing Infrastructure, IEEE Transactions on Industrial Informatics, 2019.

.Junsong Fu, Na Wang, A Practical Attribute-Based Document Collection Hierarchical Encryption Scheme in Cloud Computing, IEEE Access, 2019.

. Jinbo Xiong, Yuanyuan Zhang,Shaohua Tang, Ximeng Liu,And Zhiqiang Yao Secure Encrypted Data With

Authorized Deduplication In Cloud,Digital Object Identifier 10.1109/Access.2019.2920998, IEEE Access, 2019.

Yanqing Yao, Zhengde Zhai, Jianwei Liu, Zhoujun Li, Lattice-based Key-Aggregate

(Searchable) Encryption in Cloud Storage, DOI 10.1109/ACCESS.2019.2952163, IEEE Access, 2019.

. Shangping Wang, Shasha Jia,And Yaling Zhang, Verifiable and Multi-keyword Searchable Attribute-based Encryption Scheme for Cloud Storage, DOI 10.1109/ACCESS.2019.2910828, IEEE Access, 2019.

Samana Paudel, Data Breach a Cybersecurity Issue in Cloud, https://www.researchgate.net/publication/33 5243297, IEEE Access,August,2019.

.Manreet Sohal, Sandeep Sharma, BDNA-A DNA Inspired Symmetric Key Cryptographic

Technique to Secure Cloud Computing, Journal of King Saud University - Computer and Information

Sciences, Springer, 2018.

.Ahmed Bentajera, Mustapha Hedaboub, Karim Abouelmehdic, Said ELFEZAZI, CS-

IBE: A Data Confidentiality System in Public Cloud Storage System, Elsevier, pp.559–564, (2018).

Kumar, V., Ahmad, M., Kumari, A., A Secure Elliptic Curve Cryptography Based Mutual Authentication Protocol for Cloud-assisted TMIS, doi: https://doi.org/10.1016/ j.tele.2018.09.001. Elseveir, 2018.

Maadala Chandra Sekhar, Keerthi Kethineni, Secure Data Sharing in Cloud Computing Using Revocable- Storage Identity-Based Encryption,IJCSE, Vol.-6, Issue-7, July 2018.

.Luca Ferretti, Mirco Marchetti, Mauro Andreolini, Michele Colajanni,A symmetric cryptographic scheme for data integrity verification in cloud databases, Journal of Information Sciences, 2017.

.Niharika Singh, Ashutosh Kumar Singh, Data Privacy Protection Mechanisms in Cloud, Springer, 2017.

.Guofeng Lin, Hanshu Hong, and Zhixin Sun, A Collaborative Key Management Protocol in Ciphertext Policy Attribute- Based Encryption for Cloud Data Sharing, IEEE Access, 2017.

Rishav Chatterjee, Sharmistha Roy, Cryptography in Cloud Computing: A Basic Approach to Ensure Security in Cloud, IJESC, 2017.

. Baojiang Cui, Zheli Liu, and LingyuWang, Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage, IEEE Transactions On Computers, Vol. 65,

No. 8, August 2016.

. Kefeng Fan, Xiangzhen Yao, Xiaohe Fan, Yong Wang and Mingjie Chen, A new usage control protocol for data protection of cloud environment, DOI 10.1186/s13635-016-0031-6,springer,2016.

Lewis Nkenyereye, Youngho Park and Kyung Hyune Rhee, A secure billing protocol over attribute-based encryption in vehicular cloud computing, DOI 10.1186/s13638-016-0687-0, springer,2016.

. Jongkil Kim, Surya Nepal, A Cryptographically Enforced Access Control with a Flexible User Revocation on Untrusted Cloud Storage, DOI 10.1007/s41019-016-0014-0, Springer, September 2016.

Jiguo Li, Xiaonan Lin, Yichen Zhang and Jinguang Han, KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage, DOI 10.1109/TSC.2016.2542813, IEEE access, 2016.

Rishi Kumar Sharma, Dr. R.K.Kapoor, Pavan Kumar Sharma, Re-Otp Key Management Mechanism for the Cloud Data Security,Vol. 5, Issue. 11, November 2016, IJCSMC, pg.44 – 51.

Lan Zhou, Vijay Varadharajan, Michael Hitchens, Secure administration of cryptographic role-based access control for large-scale cloud storage systems, http://dx.doi.org/10.1016/j.jcss.2014.04.019,Elsiver,2014.

Rajani Devi.T, Importance of Cryptography in Network Security, International Conference on Communication Systems and Network Technologies, IEEE, 2013.

.Khaled Salah, Jose M. Alcaraz Calero, Sherali Zeadally, Sameera Al-Mulla and Mohammed Alzaabi, Using Cloud Computing to Implement a Security Overlay Network, IEEE Computer and Reliability Societies, 2013.

Downloads

Published

2021-06-30

How to Cite

Vinothkumar, S., Amutharaj, J., & Jeyabalan, S. (2021). A COMPREHENSIVE STUDY OF CRYPTOGRAPHY AND KEY MANAGEMENT BASED SECURITY IN CLOUD COMPUTING. The Journal of Contemporary Issues in Business and Government, 27(3), 1909–1923. Retrieved from https://cibgp.com/au/index.php/1323-6903/article/view/1798