Back close

Enhanced key establishment technique for secure data access in cloud

Publication Type : Conference Paper

Publisher : 2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)

Source : 2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT) (2019)

Url : https://ieeexplore.ieee.org/abstract/document/8977720

Campus : Bengaluru

School : Department of Computer Science and Engineering, School of Engineering

Department : Computer Science

Year : 2019

Abstract : Today the IT environment concentrates on Cloud computing where the usage of cloud based applications poses various security threats. Many possible cloud applications fall victim to a tragedy of the generic approach such that a shared cloud service is becoming unstable and insecure based on the commercial demands by IT and other business organization. Companies should develop proper security guidelines for public and private cloud use and utilize an adequate cloud access model. Based on set of features in the three common cloud services, a set of security capabilities is identified which are needed to exercise those characteristic and the cryptographic dealing they entail. Random Number Generators can be used in cloud hosts especially for virtualized machines. Several purpose of Pseudo Random Number Generator (PRNG) exists in cloud which mainly can be used to authenticate users to the information stored on cloud, salts for the passwords or for statistical sampling. ANSI X9.31 is one standard pseudo random number generator used in many standard cryptographic algorithms like AES, RSA that are managed in securing data access in cloud applications. As ANSI X9.31 seed values are not secure they are directly used for generation. With brute force attack the seed values are exposed. On retrieval of seed values the key can be predicted which leads to insecurity of the information stored on the cloud. The proposed obfuscation technique protects from intruders. The proposed technique takes considerable minimum amount of time when compared with the existing method.

Cite this Research Publication : V. Reddy and Dr. Prakash G., “Enhanced key establishment technique for secure data access in cloud”, in 2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), 2019.

Admissions Apply Now