Enhancing Security in Cloud Computing by Combining Dynamic Broadcast Encryption and Group Signature

V. Ganesh Karthikeyan*, R.Malar Priya**, R.Kalpana***
* Assistant Professor, Adithya Institute of Technology,
**-*** PG Scholars, Adithya Institute of Technology
Periodicity:June - August'2013
DOI : https://doi.org/10.26634/jcom.1.2.2449

Abstract

Cloud computing refers to a network that distributes processing power, applications, and large systems among many computers. Cloud computing seems to offer some incredible benefits for communicators: the availability of an incredible array of software applications, access to lightning-quick processing power, unlimited storage, and the ability to easily share and process information. All of this is available through the browser any time it can access the Internet. While this might all appear enticing, there remain issues of reliability, portability, privacy, and security, since the data transmission on the internet or over any networks are vulnerable to the hackers attack. The authors are in great need of encrypting the data. This paper combines the techniques of cloud data storage and content Distribution by dynamic broadcast encryption algorithm along with the Bit Torrent application which results in minimizing the difficulties of bulky data and aims in resulting efficient sharing of the secure storage services in cloud computing.

Keywords

Bit Torrent, Content Distribution, Dynamic Broadcast Encryption, Group Signature.

How to Cite this Article?

Karthikeyan, V.G., Priya, R.M., and Kalpana, R. (2013). Enhancing Security In Cloud Computing By Combining Dynamic Broadcast Encryption And Group Signature. i-manager’s Journal on Computer Science, 1(2), 24-28. https://doi.org/10.26634/jcom.1.2.2449

References

[1]. Raymond sweha., Vatche Ishakian., Azer Bestavros. th (2011). Angels in the Cloud, IEEE 4 International Conference.
[2]. M. Piatek., T. Isdal., T. Anderson., A. Krishnamurthy., and Venkataramani. (2007) “Do incentives build robustness in BitTorrent,” in NSDI. International Conference on Cloud Computing.
[3]. Qian Wang., Cong Wang., Kui Ren., Wenjing Lou., Jin L (2011). “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing", IEEE Transactions On Parallel And Distributed Systems, Vol. 22, No. 5.
[4]. Robert Gellman and World Privacy Forum. (2009). “Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing”, February 23.
[5]. K. D. Bowers., A. Juel.s, and A. Oprea. (2008). “HAIL: A High-Availability and Integrity Layer for Cloud Storage,” C r y p t o l o g y e P r i n t A r c h i v e , a v a i l a b l e a t http://eprint.iacr.org/489.
[6]. Reducing upload and Download Time on Cloud using Content Distribution Algorithm published at International Journal on Recent and Innovation Trends in Computing and Communication ,ISSN 2321 – 8169 .
[7]. D. Chaum and E. van Heyst, (1991). Group signatures. In EUROCRYPT'91, Volume 54of LNCS, pages 257–265 Springer-Verlag.
[8]. J. Dean and S. Ghemawat, (2004). MapReduce: Simplified Data Processing on Large Clusters. In USENIX OSDI.
[9]. Metri P. and Sarote G., (2011). “Privacy Issues and Challenges in Cloud computing,” International Journal of Advanced Engineering Sciences and Technologies, Vol. 5, No. 1, pp. 5-6.
[10]. Cong Wang, Qian Wang, Kui Ren, and Wenjing Lou, (2009). Ensuring Data Storage Security in Cloud Computing. in 17th International Workshop on IWQoS, pages 1-7.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.