Two level Encryption Decryption by Diffie – Hellman and Elliptic Curve cryptography with Open ID scenario for Securing Cloud environment

Authors

  • Arti Pandey  Department of Computer Science, LNCT, JABALPUR, Madhya Pradesh, India
  • Raghvendra Kumar  Department of Computer Science, LNCT, JABALPUR, Madhya Pradesh, India

Keywords:

ECC, GCP, cloud computing diffie Hellman key exchange.

Abstract

Cloud Computing offers services to end-users rather than a product, by sharing resources, software and other information under a pay per usage model, hence economic benefit is the key for Cloud in terms of capital and operational expenditure. It permits hosting of different types of applications such as business, scientific and social networking because it has key characteristics like multitenancy, scalability, performance and security etc.

Cloud Computing is currently facing challenges like Data Security, Energy Consumption, Server Consolidation, Virtual Machine Migration to name a few. Existing approaches of secure data transfer use two tier authentications, either based on OTP (One Time Password) which is static in nature and requires additional software/hardware or Digital Signature which leads to the problem of key management. This research work focuses on the study of secure data transfer by using different combination of mechanisms which not only ensure two tier authenticities without involving any above mentioned overheads but also maintain the confidentiality of data and integrity of message using one time key generation.

In this paper, existing secure data transfer techniques have been compared. A mechanism has been proposed and simulated for secure data transfer. This mechanism ensures three way protections in term of authenticity, confidentiality and integrity based on the concept of single key. This technique uses ECC with Diffie Hellman Key Exchange to enhance data security in terms of authenticity and integrity in Cloud Computing environment. In this mechanism Optimally Modified ECC been used to prevent the man-in-middle-attack. An encryption algorithm has been used to maintain the confidentiality of data in transmits.

Flow of the execution stages has been described using Flow Diagram and Sequence Diagram while for GCP (google cloud platform) has been used to validate the experimental results of ECC AND DIFFIE HELLMAN KEY EXCHANGE.

References

  1. "Cloud Computing Evolution," onlineAvailable: www. computerweekly.com/feature/A-history-of-Cloud-computing. Feb. 20, 2014].
  2. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica and M. Zaharia, "A view of cloud computing", Communications of the ACM, vol.53, no.4, pp. 50-58, 2010.
  3. M. Creeger, "Cloud computing: an overview," ACM Queue, vol.7, no.5, pp. 2, 2009.
  4. R. Buyya, C.S. Yeo, S. Venugopal, J. Broberg, I. Brandic, "Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility," Future Generation computer systems, vol. 25, no. 6, pp. 599- 616, 2009.
  5. I. Foster and C. Kesselman, "The grid 2: blueprint for a future computing infrastructure," Waltham: Morgan Kaufmann Publishers, 2004.
  6. M. A. Rappa, "The utility business model and the future of computing services," IBM Systems Journal, vol. 43, no. 1, pp. 32-42, 2004.
  7. L. Kleinrock, "A vision for the internet," ST Journal of Research, vol. 2, no. 1, pp. 4-5, 2005.
  8. M. Turner, D. Budgen and P. Brereton, "Turning software into a service," Computer, IEEE, vol. 36, no.10, pp. 38-44, 2003.
  9. "Evolution of Cloud computing," onlineAvailable: www.tech.gaeatimes.com/index.php/archive/top-10-Cloud-computing-service- providers-in-2010. Feb. 20, 2014]
  10. "Cloud Watch Hub," onlineAvailable at: http://www.cloudwatchhub.eu/glossary. Oct. 4, 2013].
  11. "Seeding the Clouds: Key Infrastructure Elements for Cloud Computing," onlineAvailable: http://www- 935.ibm.com/services/in/cio/pdf/oiw03022usen.pdf. Feb. 20, 2014]
  12. Vaquero, M. Louis, R. Merino, Luis and Maik, "A break in the clouds: towards a cloud definition," ACM SIGCOMM Computer Communication Review, vol. 39, no. 1, pp. 50-55, 2008.
  13. "Gartner says contrasting views on Cloud computing are creating confusion," onlineAvailable: www. gartner.com/newsroom/id/766215. Feb. 20, 2014]
  14. M. Brown, "White paper: Cloud computing," Maximum PC, Jan. 12, 2009.
  15. R. Buyya, C. Yeo, and S. Venugopal, "Market-oriented cloud computing: vision, hype and reality for delivering it services as computing utilities", Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, HPCC-OB, IEEE CS Press, Los Alamitos, CA, USA,pp. 5-13, 2008.
  16. P. Mell and T. Grance, "The NIST Definition of Cloud computing," National Institute of Standards and Technology, vol. 53, no. 6, 20

Downloads

Published

2016-08-30

Issue

Section

Research Articles

How to Cite

[1]
Arti Pandey, Raghvendra Kumar, " Two level Encryption Decryption by Diffie – Hellman and Elliptic Curve cryptography with Open ID scenario for Securing Cloud environment , International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 2, Issue 4, pp.52-56, July-August-2016.