scholarly journals Efficient and Secure Group Data Sharing Model Using Cloud Computing

2021 ◽  
Vol 23 (06) ◽  
pp. 1733-1736
Author(s):  
Mohit Kabadi ◽  
◽  
Gitesh Ghorpade ◽  
Munot Sarode ◽  
Sameer Sagar ◽  
...  

Cloud computing is alleged to be the service homeward-bound computing technology, that ar reasonable and versatile over the web. In the past few years, the cloud has become more experienced and provided several services, one in all the first service is a knowledge sharing in the cluster, wherever the information is often simply shared from one member to a different. However, whereas sharing information security is one of the first concerns. In past, many methodologies have been planned. However, these strategies lacked feasibleness. Hence, during this paper, we’ve proposed a methodology that relies on the chosen theme. Here General cluster secret’s generated and what is more General Key agreement protocol is redistributed primarily based model wherever the information ar controlled by the owner inside the constant cluster. Moreover, the planned methodology is evaluated by analyzing the comparative analysis supported by the assorted range of parameters. Result Analysiscounsel that our methodology merely outperforms the present one.

Author(s):  
Kache Vishwamithra ◽  
G Santhosh Abhinai ◽  
S Aakash ◽  
M Rajvel

In passed-on overseeing, assets are everything considered in the cloud master's connection and dependably got the idea by the cloud clients through open channels. The key system decorations with a got channel foundation over a public channel for the ensured trades between a cloud client and a cloud ace association. The stream key design shows for passed on figuring experience the risky effects of express inconveniences, e.g., seeing low connection delay, disposing of verbalization the central issues, restoring client accreditation, and putting forth an attempt not to stun haphazardness. To manage these heaps, we propose a less testament 0-RTT dull AKA show against baffling eccentricity for secure station foundation in passed-on figuring. As a 0-RTT show, it as a rule speeds up the sensibility of the got channel foundation measure. Further, our show needn't unwind up around with the highlights of an infuriating circumstance a public key with a substance's character and beginning now and for an earnest period of time handles the check of the beginning issue. At long last, a solid security assessment of the show is other than proposed. The show doesn't just fulfill the standard security credits (e.g., known-key security, dull key-share), yet in like manner, solid security ensures, i.e., client certification and puzzling anomaly get.


Jurnal Teknik ◽  
2017 ◽  
Vol 6 (1) ◽  
Author(s):  
Samudra Dipa Legawa

Advances in information technology have changed the way of processing information who used to be a mainframe to personal computers to the web-based computing.Today, many organizations are seriously considering adopting cloud computing technology,Cloud computing is the combined use of computer technology in a network with the development of Internet-based (cloud) which has the function to run a program or application via a computer - a computer connected at the same time. However, the application of cloud computing itself led to various risksKata kunci : teknologi informasi, cloud computing, manajemen resiko


Author(s):  
A. Sumathi ◽  
Dr. V. Divya

Cloud computing technology is a new buzzword in the IT industry and expecting a new for coming world. It is a style of computing which is having dynamically scalable virtualized resources provided as a service over the Internet. It reduces the time required to procure heavy resources and boot new server instances in minutes, allowing one to quickly scale capacity, both up and down, as ones requirement changes. With the rise of a ubiquitous provision of computing resources over the past years, cloud computing has been established as a prominent research topic. Many researchers, however, focus exclusively on the technical aspects of cloud computing, thereby neglecting the business opportunities and potentials cloud computing can offer. Enabled through this technology, new market players and business value networks arise and break up the traditional value chain of service provision. The focus of this paper lies on the real business aspects of cloud computing.


Author(s):  
Faiq Wildana

AbstractAlong with the development of cloud computing technology, several government institution are ready to use cloud computing, even some have started implementing this technology. Currently cloud computing has just recently adapted in Indonesia. It is important to know the comparison and usage analysis of some instituitions that have been used. This study used a qualitative approach with interview instrument conducted for each instituition. Respondents who become the object of this research are LKPP, BIG, Balai IPTEK-net BPPT, and Ministry of Communications and Informatics. The four instituitions are selected because it is a central instituition that has been implemented cloud computing with a wide range of services. The method of analysis used is a comparative method which compares cloud computing services. Comparative analysis approach is issues and challenges of cloud computing. The study produces an overview of the application of cloud computing in government instituitions along with suggestions that should be done.AbstrakSeiring dengan perkembangan teknologi cloud computing, beberapa instansi pemerintahan sudah merencanakan pemanfaatan cloud computing, bahkan sudah ada yang mulai memanfaatkan teknologi ini. Sedangkan cloud computing belum lama ini baru mulai diadaptasi di Indonesia. Kiranya penting untuk mengetahui komparasi dan analisis pemakaian oleh beberapa instansi yang sudah menggunakan. Penelitian ini menggunakan pendekatan kualitatif dengan instrumen wawancara yang dilakukan kepada masing-masing instansi. Responden yang menjadi objek penelitian ini yaitu LKPP, BIG, Balai IPTEK-net BPPT, dan Kementerian Kominfo. Keempat instansi tersebut dipilih karena merupakan instansi pusat yang diketahui sudah menerapkan cloud computing dengan jangkauan layanan yang luas. Metode analisis yang digunakan adalah metode komparatif dimana membandingkan keempat objek penelitian terkait layanan cloud computing yang diberikan. Analisis komparasi menggunakan pendekatan isu dan tantangan cloud computing. Studi menghasilkan gambaran penerapan cloud computing di instansi pemerintahan beserta saran yang seharusnya dilakukan.


Author(s):  
Thukkaiprasanth. T ◽  
Dr. M. Ramesh Kumar ◽  
Sivagurunathan. A ◽  
UdhayaKumar. C, Vignesh.R. S ◽  

2020 ◽  
Author(s):  
Huihui Huang ◽  
Siqi Lu ◽  
Zehui Wu ◽  
Qiang Wei

Abstract With the widespread use of Internet of Things and cloud computing in smart cities, various security and privacy challenges may be encountered. The most basic problem is authentication between each application. Recently, in order to prevent counterfeiting attacks in the protocol of Amin et al.(2018), Kang et al. improved an authentication protocol for IoT-Enabled devices in a distributed cloud computing environment (2020). However, We found that the Kang et al.'s protocol still has a fatal vulnerability, that is, it is attacked by offline password guessing, and malicious users can easily obtain the master key of the control server. In this article, we extend their work to design a lightweight pseudonym identity based authentication and key agreement protocol using smart card. For illustrating the security of our protocol, we used the security protocol analysis tools of AVISPA and Scyther to prove that the protocol can defend against various existing attacks. We will further analyze the interaction between participants authentication path to ensure security protection from simulated attacks detailedly. In addition, based on the comparison of security functions and computing performance, our protocol is superior to the other two related protocols. As a result, the enhanced protocol will be efficient and secure in distributed cloud computing architecture for smart city.


2019 ◽  
Vol 480 ◽  
pp. 55-69 ◽  
Author(s):  
Qikun Zhang ◽  
Xianmin Wang ◽  
Junling Yuan ◽  
Lu Liu ◽  
Ruifang Wang ◽  
...  

2019 ◽  
Vol 16 (6) ◽  
pp. 996-1010 ◽  
Author(s):  
Jian Shen ◽  
Tianqi Zhou ◽  
Debiao He ◽  
Yuexin Zhang ◽  
Xingming Sun ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document