Title :
Cloud-user security based on RSA and MD5 algorithm for resource attestation and sharing in java environment
Author :
Dubey, Ashutosh Kumar ; Dubey, Animesh Kumar ; Namdev, Mayank ; Shrivastava, Shiv Shakti
Abstract :
The increased degree of connectivity and the increasing amount of data has led many providers and in particular data centers to employ larger infrastructures with dynamic load and access balancing. This lead to the demand of cloud computing. But there are some security concerns when we handle and share data in the cloud computing environment. In this paper we propose a new cloud computing environment where we approach a trusted cloud environment which is controlled by both the client and the cloud environment admin. Our approach is mainly divided into two parts. First part is controlled by the normal user which gets permission by the cloud environment for performing operation and for loading data. Second part shows a secure trusted computing for the cloud, if the admin of the cloud want to read and update the data then it take permission from the client environment. This provides a way to hide the data and normal user and can protect their data from the cloud provider. This provides a two way security protocol which helps both the cloud and the normal user. For the above concept we apply RSA and MD 5 algorithm. When the cloud user upload the data in the cloud environment, the data is uploaded in encrypted form using RSA algorithm and the cloud admin can decrypt using their own private key. For updating the data in the cloud environment admin request the user for a secure key. Cloud user sends a secure key with a message digest tag for updating data. If any outsiders perform a change in the key, the tag bit is also changed indicating the key is not secure and correct.
Keywords :
Java; cloud computing; computer centres; cryptographic protocols; public key cryptography; resource allocation; trusted computing; Java environment; MD5 algorithm; RSA algorithm; access balancing; cloud admin; cloud computing environment; cloud-user security; data centers; data protection; dynamic load balancing; message digest tag; resource attestation; resource sharing; trusted cloud environment; trusted computing; two way security protocol; Authentication; Cloud computing; Computational modeling; Computer architecture; Reliability; Cloud Environment; Java; Security; Sharing;
Conference_Titel :
Software Engineering (CONSEG), 2012 CSI Sixth International Conference on
Conference_Location :
Indore
Print_ISBN :
978-1-4673-2174-7
DOI :
10.1109/CONSEG.2012.6349503