To Enhance Homomorphic Encryption scheme for Key Management and Key Sharing in Cloud Computing
Journal Title: International journal of Emerging Trends in Science and Technology - Year 2014, Vol 1, Issue 6
Abstract
The cloud can offer services to the users at lower cost and services are available at anytime, anywhere, user data security is the main challenge in cloud computing. The data encryption is the best way for providing data security in cloud computing. Fully homomorphic encryption scheme is reliable and secure encryption technique. The main problem with fully disk encryption scheme is key management, key storage and data aggregation. To solve the problem of key management and key sharing various schemes are proposed in last few years. The third party auditor is the scheme for key management and key sharing. The third party auditor scheme will be failed if the third party’s security is compromised or third party will be malicious. Cloud computing is very latest technology which is widely used in these days. There are some security threats in this network. The proposed scheme is used to provide security to the cloud so that attacker will unable to hack the information using Diffie- Hellman key exchange protocol. . In Diffie -Hellman algorithm, there is no provision for the storage or exchange of the PIN key. So it protects network devices from attacks.
Authors and Affiliations
Preeti Ahuja
Network Density Based Analysis of MANET Routing Protocols using ClientServer and Peer-to-Peer Architecture based Applications
Mobile Ad-hoc Network (MANET) is a network with structure less self organizing an autonomous system of mobile nodes which are connected by wireless links. In mobile network every mobile node functions as transmitter, rou...
A Local Position of Recognition of Node Duplication Attacks in Wireless Networks
IP spoofing-based submerging attacks are a serious and open security problem on the current Internet. The best current anti-spoofing practices have long been implemented in modern routers. However, they are not sufficien...
On the determination of interlaminar fracture toughness of carbon/epoxy cross-ply composites
Delamination between layers is a dangerous failure mode in fiber reinforced composite laminates. Pure mode I tests were conducted to determine the interlaminar fracture toughness, using 16-ply DCB specimens prepared from...
Control of smart beams using H∞ to suppress vibrations
This paper deals with the development of a control scheme for the control of vibrations in smart cantilever beams using Hinfinity technique. Vibration control plays a very important role in the modern day world especiall...
Energy Efficient Clustering In Wireless Sensor Networks
Wireless sensor network is the group of sensor nodes that may be in a well-defined manner or may be in any fashion performs the function related to the environment by sensing the environment through sensor nodes and tran...