메뉴 건너뛰기
.. 내서재 .. 알림
소속 기관/학교 인증
인증하면 논문, 학술자료 등을  무료로 열람할 수 있어요.
한국대학교, 누리자동차, 시립도서관 등 나의 기관을 확인해보세요
(국내 대학 90% 이상 구독 중)
로그인 회원가입 고객센터 ENG
주제분류

추천
검색
질문

논문 기본 정보

자료유형
학술저널
저자정보
Debajyoti Mukhopadhyay (Maharashtra Institute of Technology) Abhay kawade (Maharashtra Institute of Technology) Akash Thakur (Maharashtra Institute of Technology) Nikhilesh Chaudhari (Maharashtra Institute of Technology) Sani Nanekar (Maharashtra Institute of Technology)
저널정보
한국산학기술학회 SmartCR Smart Computing Review 제5권 제3호
발행연도
2015.6
수록면
201 - 208 (8page)

이용수

표지
📌
연구주제
📖
연구배경
🔬
연구방법
🏆
연구결과
AI에게 요청하기
추천
검색
질문

초록· 키워드

오류제보하기
Cloud computing is an emerging domain that enables the deployment of a new IT service paradigm. Cloud providers offer a wide range of services which are charged per unit basis. The major challenge facing clouds is security. It includes ensuring the safety of the infrastructure as well as protection against unauthorized access. In this paper, we deal with cloud security services, including key agreements and authentication. By employing Elliptic Curve Cryptography for client authentication process and data storage, we design the Multi-Server Cloud Computing system. Our scheme chooses not to store encryption keys anywhere in the cloud because of the secret isolation guideline. A request counter is used at the time of the client authentication process to prevent replay attacks. To aid in controlled access, a mandatory access control model is preferred. We split the encrypted data and store it on different clouds, which provides security against attacks on the storage server. Restrictions are imposed to ensure only selected employees (administrators) have authority to handle the encrypted data.
Our Multi-Server Cloud Computing system is used to fit an environment in which each cloud contains multiple servers that collaborate in serving applications. One cloud is used for client authentication and key agreement, and another cloud for data splitting and combining. Due to strong security and operation efficiency, the proposed secure cloud computing should be most suitable for use in a cloud computing environment.

목차

Abstract
Introduction
Related Work and Novelty of Approach
Proposed Work
Understanding Pre-requisites
Conclusion
References

참고문헌 (0)

참고문헌 신청

함께 읽어보면 좋을 논문

논문 유사도에 따라 DBpia 가 추천하는 논문입니다. 함께 보면 좋을 연관 논문을 확인해보세요!

이 논문의 저자 정보

최근 본 자료

전체보기

댓글(0)

0