An Instance Communication Channel Key Organizer Model for Enhancing Security in Cloud Computing

被引:0
|
作者
Brindha, Thomas [1 ]
Shaji, Ramaswamy [1 ]
机构
[1] Noorul Islam Univ, Dept Informat Technol, Kanyakumari, Tamil Nadu, India
关键词
Cloud computing; data sharing; security; key organizer; communication channel; data management;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing has evolved as one of the next generation structural design of the IT endeavors in the recent years. It enables to function like the Internet through the process of accessing and sharing computing resources as virtual resources in a protected and scalable way, thereby obtaining huge influence in corporate data centers. Even as remotely hosted, governed services have long been a component of the IT landscape, an enhanced awareness in cloud computing has been powered by ubiquitous networks, maturing standards, the increase of hardware and software virtualization, and the drive to bring about IT costs flexible and obvious. Several schemes have been provided in cloud computing for enhancing the security, however most of them sustain from leakage of data. This leads to a greater issue while sharing the data in the cloud computing environment. In order to realize the leakage of data in the cloud, we address the construction of an efficient technique, Instance Communication Channel Key Organizer (ICCKO) model to support the security and data confidentiality in a secure manner. We formally prove the data security of ICCKO model based on client and server and analyze its performance and computational complexity. Performance of ICCKO model is evaluated in terms of communication overhead, log creation time, data transfer rate and channel disturbance level for sharing the data securely. Extensive security and performance analysis shows that the proposed scheme is tremendously efficient and provides with provable secure data sharing.
引用
收藏
页码:509 / 516
页数:8
相关论文
共 50 条
  • [41] Security Features of Cloud Computing Using New Symmetric Key Algorithm
    Al-Maliki, Saeed Q. Al-Khalidi
    Alfifi, Fahad
    VISION 2020: SUSTAINABLE GROWTH, ECONOMIC DEVELOPMENT, AND GLOBAL COMPETITIVENESS, VOLS 1-5, 2014, : 51 - +
  • [42] Key Derivation Policy for data security and data integrity in cloud computing
    Senthil Kumari P.
    Nadira Banu Kamal A.R.
    Automatic Control and Computer Sciences, 2016, 50 (3) : 165 - 178
  • [43] A Security Threats Measurement Model for Reducing Cloud Computing Security Risk
    Lai, Sen-Tarng
    Leu, Fang-Yie
    2015 9TH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING IMIS 2015, 2015, : 414 - 419
  • [44] The Strategy of Cryptography for the Proposed Model of Security in Cloud Computing
    Hyseni, Dhurate
    Selimi, Besnik
    Luma, Artan
    Cico, Betim
    2017 IEEE INTERNATIONAL CONFERENCE ON POWER, CONTROL, SIGNALS AND INSTRUMENTATION ENGINEERING (ICPCSI), 2017, : 24 - 28
  • [45] Research on the security mechanism of cloud computing service model
    Zhang Y.
    Automatic Control and Computer Sciences, 2016, 50 (2) : 98 - 106
  • [46] Evaluation and Analysis on Security Framework Model of Cloud Computing
    Li, Zhao
    PROCEEDINGS OF THE 2015 4TH INTERNATIONAL CONFERENCE ON COMPUTER, MECHATRONICS, CONTROL AND ELECTRONIC ENGINEERING (ICCMCEE 2015), 2015, 37 : 572 - 578
  • [47] The Research Based on Security Model and Cloud Computing Strategy
    Pei, Aoqiu
    Yang, Min
    Tang, Yanbin
    ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1600 - 1603
  • [48] An Efficient Model for Privacy and Security in Mobile Cloud Computing
    Ragini
    Mehrotra, Parul
    Venkatesan, S.
    2014 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2014,
  • [49] Security as a Service Model for Virtualization Vulnerabilities in Cloud Computing
    Paikrao, Rahul L.
    Patil, Varsha H.
    2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMMUNICATION AND COMPUTING TECHNOLOGY (ICACCT), 2018, : 559 - 562
  • [50] Data Security Access Control Model of Cloud Computing
    Hu, Jun
    Chen, Lei
    Wang, Yunhua
    Chen, Shi-hong
    2013 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND APPLICATIONS (CSA), 2013, : 29 - 34