Abstract
Cloud computing represents the latest phase in the evolution of Internet-based computing. In spite of the attractive properties it provides, security and privacy issues loom large for cloud computing. In this paper, we concentrate on the security threats involved in cloud by providing an Authenticated Key Exchange Protocol (AKExP). In this protocol, we make use of the identity management scheme and symmetric key encryption algorithm so that unauthorized users cannot get access to the sensitive data stored in the cloud. This proposed approach minimizes the computation cost and communication cost when compared with another authentication protocol, Identity-based Authentication Protocol. This paper provides an efficient and secure way to authenticate the user in the cloud both by the owner and cloud service provider.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Li, H., Dai, Y., Tian, L., Yang, H.: Identity-Based Authentication for Cloud Computing. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) Cloud Computing. LNCS, vol. 5931, pp. 157–166. Springer, Heidelberg (2009)
Identiy Based Cryptography for Cloud Security, http://eprint.iacr.org/11/169
Crampton, J., Lim, H.W., Paterson, K.G.: What can Identity-Based Cryptography offer to Web Services? In: SWS 2007: Proc. of the 2007 ACM Workshop on Secure Web Services, pp. 26–36. ACM (2007)
Amazon Elastic Compute Cloud, http://aws.amazon.com/ec2 (access on October 2009)
IBM Blue Cloud project, http://www-03.ibm.com/press/us/en/pressrelease/22613.wss/ (access on October 2009)
Abawajy, J.: Determining Service Trustworthiness in InterCloud Computing Environments. In: 10th International Symposium on Pervasive Systems, Algorithms and Networks (I-SPAN 2009), pp. 784–788 (2009)
Kang, L., Zhang, X.: Identity-Based Authentication in Cloud Storage Sharing. In: IEEE International Conference on Multimedia Information Networking and Security, pp. 851–855 (2010)
Nanda Kishore, M.S., Jayakumar, S.K.V., Satya Reddy, G., Dhavachelvan, P., Chandramohan, D., Soumya Reddy, N.P.: Web Service Suitability Assessment for Cloud Computing. In: Wyld, D.C., Wozniak, M., Chaki, N., Meghanathan, N., Nagamalai, D. (eds.) NeCoM 2011, WeST 2011, WiMoN 2011. CCIS, vol. 197, pp. 622–632. Springer, Heidelberg (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chandramohan, D., Vengattaraman, T., Basha, M.S.S., Dhavachelvan, P. (2012). MSRCC – Mitigation of Security Risks in Cloud Computing. In: Meghanathan, N., Nagamalai, D., Chaki, N. (eds) Advances in Computing and Information Technology. Advances in Intelligent Systems and Computing, vol 176. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31513-8_54
Download citation
DOI: https://doi.org/10.1007/978-3-642-31513-8_54
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-31512-1
Online ISBN: 978-3-642-31513-8
eBook Packages: EngineeringEngineering (R0)