Abstract

The cloud computing platform gives people the opportunity for sharing resources, services and information among the people of the whole world. In private cloud system, information is shared among the persons who are in that cloud. For this, security or personal information hiding process hampers. In this paper we have proposed new security architecture for cloud computing platform. This ensures secure communication system and hiding information from others. AES based file encryption system and asynchronous key system for exchanging information or data is included in this model. This structure can be easily applied with main cloud computing features, e.g. PaaS, SaaS and IaaS. This model also includes onetime password system for user authentication process. Our work mainly deals with the security system of the whole cloud computing platform.

Highlights

  • At the present world of networking system, Cloud computing [1] is one the most important and developing concept for both the developers and the users

  • Persons who are interrelated with the networking environment, cloud computing is a preferable platform for them

  • In this paper we have proposed new security architecture for cloud computing platform

Read more

Summary

INTRODUCTION

At the present world of networking system, Cloud computing [1] is one the most important and developing concept for both the developers and the users. In the area of cloud computing different security models and algorithms are applied These models have failed to solve all most all the security threats. Security models that are developed and currently used in the cloud computing environments are mainly used for providing security for a file and not for the communication system [9]. Authenticated user detection technique is currently very important thing This technique is rarely discussed in the recently used models for ensuring security in cloud computing. In this paper we have proposed new security architecture for cloud computing platform In this model high ranked security algorithms are used for giving secured communication process. In our proposed model distributive server concept is used, ensuring higher security This model helps to solve main security issues like malicious intruders, hacking, etc. This paper is formatted in the following way: - section II describes related work of this paper work, section III describes proposed architecture and its working steps, section IV describes the experimental environment, results in different www.ijacsa.thesai.org (IJACSA) International Journal of Advanced Computer Science and Applications, Vol 3, No 10, 2012 aspects and advantages of the proposed model, and section V describes the future aspects related to this paper work

RELATED WORK
PROPOSED MODEL
Case Studies
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.