Nothing Special   »   [go: up one dir, main page]

Skip to main content

MSRCC – Mitigation of Security Risks in Cloud Computing

  • Conference paper
Advances in Computing and Information Technology

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 176))

  • 2047 Accesses

Abstract

Cloud computing represents the latest phase in the evolution of Internet-based computing. In spite of the attractive properties it provides, security and privacy issues loom large for cloud computing. In this paper, we concentrate on the security threats involved in cloud by providing an Authenticated Key Exchange Protocol (AKExP). In this protocol, we make use of the identity management scheme and symmetric key encryption algorithm so that unauthorized users cannot get access to the sensitive data stored in the cloud. This proposed approach minimizes the computation cost and communication cost when compared with another authentication protocol, Identity-based Authentication Protocol. This paper provides an efficient and secure way to authenticate the user in the cloud both by the owner and cloud service provider.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Li, H., Dai, Y., Tian, L., Yang, H.: Identity-Based Authentication for Cloud Computing. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) Cloud Computing. LNCS, vol. 5931, pp. 157–166. Springer, Heidelberg (2009)

    Google Scholar 

  2. Identiy Based Cryptography for Cloud Security, http://eprint.iacr.org/11/169

  3. Crampton, J., Lim, H.W., Paterson, K.G.: What can Identity-Based Cryptography offer to Web Services? In: SWS 2007: Proc. of the 2007 ACM Workshop on Secure Web Services, pp. 26–36. ACM (2007)

    Google Scholar 

  4. Amazon Elastic Compute Cloud, http://aws.amazon.com/ec2 (access on October 2009)

  5. IBM Blue Cloud project, http://www-03.ibm.com/press/us/en/pressrelease/22613.wss/ (access on October 2009)

  6. Abawajy, J.: Determining Service Trustworthiness in InterCloud Computing Environments. In: 10th International Symposium on Pervasive Systems, Algorithms and Networks (I-SPAN 2009), pp. 784–788 (2009)

    Google Scholar 

  7. Kang, L., Zhang, X.: Identity-Based Authentication in Cloud Storage Sharing. In: IEEE International Conference on Multimedia Information Networking and Security, pp. 851–855 (2010)

    Google Scholar 

  8. Nanda Kishore, M.S., Jayakumar, S.K.V., Satya Reddy, G., Dhavachelvan, P., Chandramohan, D., Soumya Reddy, N.P.: Web Service Suitability Assessment for Cloud Computing. In: Wyld, D.C., Wozniak, M., Chaki, N., Meghanathan, N., Nagamalai, D. (eds.) NeCoM 2011, WeST 2011, WiMoN 2011. CCIS, vol. 197, pp. 622–632. Springer, Heidelberg (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to D. Chandramohan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chandramohan, D., Vengattaraman, T., Basha, M.S.S., Dhavachelvan, P. (2012). MSRCC – Mitigation of Security Risks in Cloud Computing. In: Meghanathan, N., Nagamalai, D., Chaki, N. (eds) Advances in Computing and Information Technology. Advances in Intelligent Systems and Computing, vol 176. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31513-8_54

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-31513-8_54

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-31512-1

  • Online ISBN: 978-3-642-31513-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics