Journal of Computer Sciences and Applications
ISSN (Print): 2328-7268 ISSN (Online): 2328-725X Website: http://www.sciepub.com/journal/jcsa Editor-in-chief: Minhua Ma, Patricia Goncalves
Open Access
Journal Browser
Go
Journal of Computer Sciences and Applications. 2015, 3(3), 73-78
DOI: 10.12691/jcsa-3-3-3
Open AccessArticle

DecenCrypto Cloud: Decentralized Cryptography Technique for Secure Communication over the Clouds

Shyam Nandan Kumar1,

1M.Tech-Computer Science and Engineering, Lakshmi Narain College of Technology, Indore, India

Pub. Date: June 03, 2015

Cite this paper:
Shyam Nandan Kumar. DecenCrypto Cloud: Decentralized Cryptography Technique for Secure Communication over the Clouds. Journal of Computer Sciences and Applications. 2015; 3(3):73-78. doi: 10.12691/jcsa-3-3-3

Abstract

With the advent of the World Wide Web and the emergence of e-commerce applications and social networks, organizations across the Cloud, share a large amount of data day by day. Secure Data sharing is an important issue over the cloud environment. In order to enhance the security services, the paper proposes Decentralized Cryptography Technique for Secure Communication over the Clouds. In this paper, Cryptography Model for Secure Data Sharing over Cloud is presented first. Cryptography Management Approach is given to access the secure resource over cloud and then Algorithm Design Methodology is provided in decentralized manner. The paper also provides a concise but all-round analysis on data security and privacy protection issues associated with cloud computing.

Keywords:
cloud computing data sharing encryption decryption cloud security cryptography secure communication data security www

Creative CommonsThis work is licensed under a Creative Commons Attribution 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

References:

[1]  G. Peter Mell, and Tim Grance, “The NIST Definition of Cloud Computing,” Version 15, 10-7-09, http://www.wheresmyserver.co.nz/storage/media/faq-iles/cloud-def-v15.pdf.
 
[2]  “Cloud Security Front and Center. Forrester Research”. 2009-11-18. http://blogs.forrester.com/srm/2009/11/cloud-security-front-andcenter.html.
 
[3]  “Cloud Security Alliance”. http://www.cloudsecurityalliance.org.
 
[4]  “Cloud Security Alliance, Security Guidance for Critical Areas of Focus in Cloud Computing”, V2.1, http://www.cloudsecurityalliance.org/guidance/csaguide.v2.1.pdf.
 
[5]  Shyam Nandan Kumar, “Cryptography during Data Sharing and Accessing Over Cloud.” International Transaction of Electrical and Computer Engineers System, vol. 3, no. 1 (2015): 12-18.
 
[6]  D. X. Song, D. Wagner, A. Perrig. “Practical techniques for searches on encrypted data”. Proceedings of the IEEE Symposium on Security and Privacy, 2000, pp. 44-55.
 
[7]  D. Boneh, G. D. Crescenzo, R. Ostrovsky, G. Persiano. “Public key encryption with keyword search. Advances in Cryptology”- EUROCRYPT'04, 2004, LNCS 3027, Springer, pp. 506-522.
 
[8]  V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-Based Encryption for Fine-Grained Access Control of Encrypted data,” in Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS ’06). ACM, 2006, pp. 89-98.
 
[9]  M. Chase and S. S. M. Chow, “Improving Privacy and Security in Multi-Authority Attribute-Based Encryption,” in ACM Conference on Computer and Communications Security, 2009, pp. 121-130.
 
[10]  M. S. S. M. Chow, J. Weng, Y. Yang, and R. H. Deng, “Efficient Unidirectional Proxy Re-Encryption,” in Progress in Cryptology - AFRICACRYPT 2010, ser. LNCS, vol. 6055. Springer, 2010, pp. 316-332.
 
[11]  G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage,” ACM Transactions on Information and System Security (TISSEC), vol. 9, no. 1, pp. 1-30, 2006.
 
[12]  Seung-Hyun Seo, Nabeel, M, Bertino, E. and Xiaoyu Ding, “An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds” IEEE Transactions on Knowledge and Data Engineering, Volume:26 , Issue: 9, pp. 2107-2119, 05 August 2013.
 
[13]  Shyam Nandan Kumar, “Review on Network Security and Cryptography.” International Transaction of Electrical and Computer Engineers System, vol. 3, no. 1 (2015): 1-11.
 
[14]  Shyam Nandan Kumar, “World towards Advance Web Mining: A Review.” American Journal of Systems and Software, vol. 3, no. 2 (2015): 44-61.
 
[15]  Shyam Nandan Kumar, “Technique for Security of Multimedia using Neural Network,” Paper id-IJRETM-2014-02-05-020, IJRETM, Vol: 02, Issue: 05, pp. 1-7. Sep-2014.