ENHANCEMENT OF CLOUD SECURITY USING ENHANCE MULTIPLICATIVE INVERSE

Authors

  • Sharma D
  • Arora S

Keywords:

Cloud computing, security

Abstract

In this research paper the discussion has been regarding cloud computing and services offered by it. This chapter focuses on the threats to cloud environment from external attacks. In order to make comparative analysis several existing researches have been discussed. The loop holes of those researches are considered. Then a proposed model with integration of MD5 and multiplicative inverse has been developed. This work has introduced more security to the cloud environment. More over the size of packet got reduced that result in high performance of system. The system is more secure and reliable due to integration of two cryptographic mechanisms.

References

M. Jensen, J. Schwenk, N. Gruschka, and L. Lo Iacono, “On technical security issues in cloud computing,” CLOUD 2009 - 2009 IEEE Int. Conf. Cloud Comput., pp. 109–116, 2009.

F. Lombardi and R. Di Pietro, “Secure virtualization for cloud computing,” J. Netw. Comput. Appl., vol. 34, no. 4, pp. 1113–1122, 2011.

P. Partheeban and V. Kavitha, “A study with security concerns in service delivery models of cloud computing,” Int. J. Appl. Eng. Res., vol. 10, no. 21, pp. 42219–42230, 2015.

Shushing Yu, Cong wang,” control fine grained data access in cloud computing,”2010.

V. K. Reddy and L. S. S. Reddy, “Security Architecture of Cloud Computing,” Int. J. Eng. Sci. Technol., vol. 3, no. 9, pp. 7149–7155, 2011.

Syam Kumar P and Subramanian R,” an effective and safe protocol with the help of ECC and Sobolseries,” 2011.

R. Prasad Padhy, M. Ranjan Patra, and S. Chandra Satapathy, “Cloud Computing: Security Issues and Research Challenges,” IRACST -International J. Comput. Sci. Inf. Technol. Secur., vol. 1, no. 2, pp. 136–146, 2011.

Downloads

Published

2017-12-30

How to Cite

Sharma, D., & Arora, S. (2017). ENHANCEMENT OF CLOUD SECURITY USING ENHANCE MULTIPLICATIVE INVERSE. Universal Research Reports, 4(12), 45–49. Retrieved from https://urr.shodhsagar.com/index.php/j/article/view/363

Issue

Section

Original Research Article