一种简单安全的云计算加密系统

S. J. Islam, Zulfiker Haider Chaudhury, S. Islam
{"title":"一种简单安全的云计算加密系统","authors":"S. J. Islam, Zulfiker Haider Chaudhury, S. Islam","doi":"10.1109/CCECE.2019.8861845","DOIUrl":null,"url":null,"abstract":"Cloud computing is a vast growing technology in the IT industries. Cloud Service Providers (CSP) are offering various suitable and flexible services to the users. Users of cloud computing are growing in an equal rhyme. As cloud computing is becoming an essential part of human life, users and CSP are noticing for suitable security feathers. Many researchers are working in the security aspects of cloud computing. In this paper, we present a suitable cryptography and secure authentication system for cloud computing. This procedure includes auto encryption and KEYs changing process in the cloud end. New generated KEYs will not be sent to users initially. Users will be checked in three steps for authentication. CSP can trigger encryption process at any time manually or it will be performed automatically after logged out by the users. This procedure will ensure extra security for data/files as well as prevent hackers from getting original files/data even they got valid credential. Proposed protocol is simulated by CloudSim and we observed that one more step needs for user’s credential, it required a bit of time to use data/files for only the first time. This bit of time is negligible and we can exclude it from consideration but security increase more and more.","PeriodicalId":352860,"journal":{"name":"2019 IEEE Canadian Conference of Electrical and Computer Engineering (CCECE)","volume":"166 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"A Simple and Secured Cryptography System of Cloud Computing\",\"authors\":\"S. J. Islam, Zulfiker Haider Chaudhury, S. Islam\",\"doi\":\"10.1109/CCECE.2019.8861845\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing is a vast growing technology in the IT industries. Cloud Service Providers (CSP) are offering various suitable and flexible services to the users. Users of cloud computing are growing in an equal rhyme. As cloud computing is becoming an essential part of human life, users and CSP are noticing for suitable security feathers. Many researchers are working in the security aspects of cloud computing. In this paper, we present a suitable cryptography and secure authentication system for cloud computing. This procedure includes auto encryption and KEYs changing process in the cloud end. New generated KEYs will not be sent to users initially. Users will be checked in three steps for authentication. CSP can trigger encryption process at any time manually or it will be performed automatically after logged out by the users. This procedure will ensure extra security for data/files as well as prevent hackers from getting original files/data even they got valid credential. Proposed protocol is simulated by CloudSim and we observed that one more step needs for user’s credential, it required a bit of time to use data/files for only the first time. This bit of time is negligible and we can exclude it from consideration but security increase more and more.\",\"PeriodicalId\":352860,\"journal\":{\"name\":\"2019 IEEE Canadian Conference of Electrical and Computer Engineering (CCECE)\",\"volume\":\"166 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-05-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 IEEE Canadian Conference of Electrical and Computer Engineering (CCECE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCECE.2019.8861845\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE Canadian Conference of Electrical and Computer Engineering (CCECE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCECE.2019.8861845","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7

摘要

云计算在IT行业是一项巨大的发展技术。云服务提供商(CSP)为用户提供各种适合和灵活的服务。云计算的用户也在以同样的节奏增长。随着云计算逐渐成为人类生活中不可或缺的一部分,用户和云计算服务提供商都在关注合适的安全防护措施。许多研究人员正在从事云计算安全方面的工作。本文提出了一种适合云计算的加密和安全认证系统。此过程包括云端的自动加密和密钥更改过程。新生成的密钥最初不会发送给用户。用户将通过三个步骤进行身份验证。CSP可以随时手动触发加密过程,也可以在用户注销后自动执行。此程序将确保数据/文件的额外安全性,并防止黑客获得原始文件/数据,即使他们获得了有效的凭证。提议的协议是由CloudSim模拟的,我们观察到多一步需要用户的凭证,它需要一点时间来使用数据/文件只是第一次。这一点时间可以忽略不计,我们可以将其排除在考虑之外,但安全性越来越高。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A Simple and Secured Cryptography System of Cloud Computing
Cloud computing is a vast growing technology in the IT industries. Cloud Service Providers (CSP) are offering various suitable and flexible services to the users. Users of cloud computing are growing in an equal rhyme. As cloud computing is becoming an essential part of human life, users and CSP are noticing for suitable security feathers. Many researchers are working in the security aspects of cloud computing. In this paper, we present a suitable cryptography and secure authentication system for cloud computing. This procedure includes auto encryption and KEYs changing process in the cloud end. New generated KEYs will not be sent to users initially. Users will be checked in three steps for authentication. CSP can trigger encryption process at any time manually or it will be performed automatically after logged out by the users. This procedure will ensure extra security for data/files as well as prevent hackers from getting original files/data even they got valid credential. Proposed protocol is simulated by CloudSim and we observed that one more step needs for user’s credential, it required a bit of time to use data/files for only the first time. This bit of time is negligible and we can exclude it from consideration but security increase more and more.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信