Journal of Engineering and Applied Sciences

Year: 2018
Volume: 13
Issue: 8
Page No. 2057 - 2061

Enhancement of Digital Signature Using Hybrid Key Generation Scheme in Cloud

Authors : Sumit Chaudhary, Neeraj Kumar Pandey and Narendra Kumar Joshi

References

Blundo, C., C. Stelvio, C.D.V. De, Sabrina, A. De Santis and S. Foresti et al., 2009. Efficient Key Management for Enforcing Access Control in Outsourced Scenarios. In: Emerging Challenges for Security, Privacy and Trust, IFIP Advances in Information and Communication Technology. Gritzalis, D. and J. Lopez (Eds.). Springer, Boston, Massachusetts, ISBN:978-3-642-01243-3, pp: 364-375.

Chehal, R., K. Singh and K. Singh, 2012. Efficiency and security of data with symmetric encryption algorithms. Intl. J. Adv. Res. Comput. Sci. Software Eng., 2: 472-475.
Direct Link  |  

Ezzarii, M., H. El Ghazi, H. Elghazi and T. Sadiki, 2015. Performance analysis of a two stage security approach in cloud computing. Proceedings of the 2015 International Conference on Cloud Technologies and Applications (CloudTech’15), June 2-4, 2015, IEEE, Marrakech, Morocco, ISBN:978-1-4673-8150-5, pp: 1-7.

Grace, S.S. and M.R. Sumalatha, 2014. SCA-An energy efficient transmission in sensor cloud. Proceedings of the 2014 International Conference on Recent Trends in Information Technology (ICRTIT’14), April 10-12, 2014, IEEE, Chennai, India, ISBN:978-1-4799-7868-7, pp: 1-5.

Hatzopoulos, D., I. Koutsopoulos, G. Koutitas and W.V. Heddeghem, 2013. Dynamic virtual machine allocation in cloud server facility systems with renewable energy sources. Proceedings of the 2013 IEEE International Conference on Communications (ICC’13), June 9-13, 2013, IEEE, Budapest, Hungary, ISBN:978-1-4673-3122-7, pp: 4217-4221.

Hu, H., J. Xu, C. Ren and B. Choi, 2011. Processing private queries over untrusted data cloud through privacy homomorphism. Proceedings of the IEEE 27th International Conference on Data Engineering, April 11-16, 2011, Hannover, Germany, pp: 601-612.

Kalpana, P. and S. Singaraju, 2012. Data security in cloud computing using RSA algorithm. Int. J. Res. Comput. Commun. Technol., 1: 143-146.
Direct Link  |  

Kaur, P. and P.D. Kaur, 2015. Energy efficient resource allocation for heterogeneous cloud workloads. Proceedings of the 2015 IEEE 2nd International Conference on Computing for Sustainable Global Development (INDIACom’15), March 11-13, 2015, IEEE, New Delhi, India, ISBN:978-9-3805-4415-1, pp: 1319-1322.

Liu, Q., G. Wang and J. Wu, 2012. Secure and privacy preserving keyword searching for cloud storage services. J. Network Comput. Appl., 35: 927-933.
CrossRef  |  

Moorthy, V. and S. Sivasubramaniam, 2012. Implementing remote data integrity checking protocol for secured storage services in cloud computing. IOSR. J. Eng., 2: 496-500.
Direct Link  |  

Nagamalli, A., S.S. Krishna and B.K. Priya, 2014. DES security algorithm implementation for cloud computing using counting bloom filter architecture. Can. J. Technol. Innovation, 1: 29-38.

Prasad, P., B. Ojha, R.R. Shahi, R. Lal and A. Vaish et al., 2011. 3 dimensional security in cloud computing. Proceedings of the 2011 IEEE 3rd International Conference on Computer Research and Development (ICCRD’11) Vol. 3, March 11-13, 2011, IEEE, Shanghai, China, ISBN:978-1-61284-839-6, pp: 198-201.

Saini, G. and N. Sharma, 2014. Triple security of data in cloud computing. Intl. J. Comput. Sci. Inf. Technol., 5: 5825-5827.
Direct Link  |  

Sharma, T. and V.K. Banga, 2013. Efficient and enhanced algorithm in cloud computing. Int. J. Soft Comput. Eng., 3: 385-390.
Direct Link  |  

Sood, S.K., 2012. A combined approach to ensure data security in cloud computing. J. Network Comput. Appl., 35: 1831-1838.
CrossRef  |  Direct Link  |  

Sood, S.K., A.K. Sarje and K. Singh, 2011. A secure dynamic identity based authentication protocol for multi-server architecture. J. Netw. Comput. Appl., 34: 609-618.
Direct Link  |  

Takouna, I., E. Alzaghoul and C. Meinel, 2014. Robust virtual machine consolidation for efficient energy and performance in virtualized data centers. Proceedings of the 2014 IEEE International Conference on Internet of Things (iThings), Green Computing Communications (GreenCom) and the IEEE Cyber, Physical and Social Computing (CPSCom), September 1-3, 2014, IEEE, Taipei, Taiwan, ISBN:978-1-4799-5968-6, pp: 470-477.

Thiyagarajan, D. and R. Ganesan, 2015. Data security model employing HyperElliptic Curve Cryptography (HECC) and Secure Hash Algorithm-3 (SHA-3) in cloud computing. Intl. J. Technol., 6: 327-335.

Wang, C., N. Cao, J. Li, K. Ren and W. Lou, 2010. Secure ranked keyword search over encrypted cloud data. J. ACM., 43: 431-473.

Xiao, Z. and Y. Xiao, 2013. Security and privacy in cloud computing. IEEE Commun. Surv. Tutorials, 15: 843-859.
CrossRef  |  Direct Link  |  

Yu, S., C. Wang, K. Ren and W. Lou, 2010. Achieving secure, scalable and fine-grained data access control in cloud computing. Proceeding of the 29th Conference on Information Communications, March 15-19, 2010, San Diego, CA., USA., pp: 1-9.

Zhou, M., Y. Mu, W. Susilo, M.H. Au and J. Yan, 2011. Privacy-preserved access control for cloud computing. Proceedings of the IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, November 16-18, 2011, Changsha, pp: 83-90.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved