{"title":"私有云安全:通过使用增强的混合算法保护用户身份验证","authors":"Nikhil Gajra, S. Khan, Pradnya B. Rane","doi":"10.1109/EIC.2015.7230712","DOIUrl":null,"url":null,"abstract":"Using cloud computing, users store their data remotely to third party owners and enjoy the on-demand applications, services and storage from a shared pool of configurable computing resources, without the burden of data storage and maintenance and costs. However, we must provide security guarantees not only on authentication but also on files over the cloud for the outsourced data, which is now maintained by third parties such as cloud providers. This research focuses on mechanism, the hybrid of AES and Blowfish for encryption. For key management and key exchange, Key is generated by the ECC key generator and then Key agreement can be done by Diffie-Hellman. Combining the concept of ECC and DH is called Elliptic Curve Diffie-Hellman (ECDH) key exchange. Authentication should be done by Using Elliptic Curve Digital Signature Algorithm (ECDSA). This provides security protection for outsourced data, while introducing only minimal performance and monetary cost overhead.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"16","resultStr":"{\"title\":\"Private cloud security: Secured user authentication by using enhanced hybrid algorithm\",\"authors\":\"Nikhil Gajra, S. Khan, Pradnya B. Rane\",\"doi\":\"10.1109/EIC.2015.7230712\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Using cloud computing, users store their data remotely to third party owners and enjoy the on-demand applications, services and storage from a shared pool of configurable computing resources, without the burden of data storage and maintenance and costs. However, we must provide security guarantees not only on authentication but also on files over the cloud for the outsourced data, which is now maintained by third parties such as cloud providers. This research focuses on mechanism, the hybrid of AES and Blowfish for encryption. For key management and key exchange, Key is generated by the ECC key generator and then Key agreement can be done by Diffie-Hellman. Combining the concept of ECC and DH is called Elliptic Curve Diffie-Hellman (ECDH) key exchange. Authentication should be done by Using Elliptic Curve Digital Signature Algorithm (ECDSA). This provides security protection for outsourced data, while introducing only minimal performance and monetary cost overhead.\",\"PeriodicalId\":101532,\"journal\":{\"name\":\"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)\",\"volume\":\"43 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-09-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"16\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EIC.2015.7230712\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EIC.2015.7230712","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Private cloud security: Secured user authentication by using enhanced hybrid algorithm
Using cloud computing, users store their data remotely to third party owners and enjoy the on-demand applications, services and storage from a shared pool of configurable computing resources, without the burden of data storage and maintenance and costs. However, we must provide security guarantees not only on authentication but also on files over the cloud for the outsourced data, which is now maintained by third parties such as cloud providers. This research focuses on mechanism, the hybrid of AES and Blowfish for encryption. For key management and key exchange, Key is generated by the ECC key generator and then Key agreement can be done by Diffie-Hellman. Combining the concept of ECC and DH is called Elliptic Curve Diffie-Hellman (ECDH) key exchange. Authentication should be done by Using Elliptic Curve Digital Signature Algorithm (ECDSA). This provides security protection for outsourced data, while introducing only minimal performance and monetary cost overhead.