Implementation On Cloud Server Security Using Password Authenticated Key Exchange

Authors

  • Payal Rani Research Scholar, Department of CSA, CDLU Sirsa
  • Monika Bansal Assistant Professor, Deptt. Of CSA ,CDLU ,Sirsa

Keywords:

computing, technical, grabbed

Abstract

Cloud computing is set of resources that are being allocated on demand. Cloud computing proposes new ways to provide services. These new innovative, technical and pricing opportunities bring changes in the way business operated. Cloud computing is the matchless computing technology. Cloud computing is a new label to an old idea. Cloud computing is a collection of resources and serviced provided by cloud service provider through internet. Cloud services are distributed from data canters sited all over the world. Cloud computing makes possible for its users to use the virtual resources via internet as per requirements. Cloud computing grabbed the spotlight in few years. General example of cloud services are Google Engine, Oracle Cloud, Office 365. As the cloud computing is growing rapidly this also leads to severe security concerns. Lack of security is the only barrier in wide adoption of cloud computing. The rapid growth of cloud computing has brought many security challenges for users and providers.

References

David Pointcheval, Olivier Blazy, New Smooth Projective Hash Functions & One-Round Authenticated Key Exchange(18_22 august 2013, Santa Barbara, California, USA), Springer-Verlag, LNCS 8042, pages 449_475.

David Pointcheval, Olivier Blazy, Effcient UC-Secure Authenticated Key-Exchange for Algebraic Languages(26 February - 1 March 2013, Nara, Japan)), 16th International Conference on Practice & Theory within Public-Key Cryptography (PKC '13)Springer-Verlag, Kaoru Kurosawa Ed., Springer-Verlag, 2013.

David Pointcheval, Password-based Authenticated Key Exchange. (21-23 may 2012, Darmstadt, Gerseveral)Springer-Verlag, LNCS 7293, pages 390-397.

David Pointcheval, Michel Abdalla, Contributory Password-Authenticated Group Key Exchange with Join Capability, (February 14-18, 2011, San Francisco, CA, USA), A. Kiayias Ed. Springer-Verlag, LNCS 6558, pages 142-160.

David Pointcheval, Xavier Boyen, Strong Cryptography from Weak Secrets, (3 – 6 may 2010, Stellenbosch, South Africa), D. Bernstein & T. Lange Eds., Springer-Verlag, LNCS 6055, pages 297–315.

David Pointcheval, Michel Abdalla, Flexible Group Key Exchange with On-Demand Computation of Subgroup Keys, (3-6 May 2010, Stellenbosch, South Africa)), D. Bernstein & T. Lange Eds., Springer-Verlag, LNCS 6055, pages 351-368.

David Pointcheval, Michel Abdalla, Distributed Public-Key Cryptography from Weak Secrets, (18_20 march 2009, Irvine, CA, USA), S. Jarecki & G. Tsudik Eds. Springer-Verlag, LNCS 5443, pages 139_159.

David Pointcheval, Michel Abdalla, Password-Authenticated Group Key Agreement with Adaptive Security & Contributiveness, (21 – 25 june 2009, Gammarth, Tunisia) B. Preneel Ed., Springer-Verlag, LNCS 5580, pages 254–271.

Rafael Álvarez, Leandro Tortosa, Analysis & design of secure key exchange scheme, Information Sciences 179 (2009) , Elsevier

Research Titled “ENHANCEMENT OF SECURITY USING CRYPTOGRAPHIC TECHNIQUES” published by Natasha Saini, Nitin Pandey & Ajeet Pal Singh

Raghav Mathur, Vishnu Sharma ans Shruti Agarwal published their research titled “Solving Security Issues in Mobile Computing using Cryptography Techniques -A Survey”

“A Modified RSA Algorithm to Enhance Security for Digital Signature” was research paper published by “Sangita A. Jaju, & Santosh S. Chowhan

Downloads

Published

30-09-2016

How to Cite

Payal Rani, & Monika Bansal. (2016). Implementation On Cloud Server Security Using Password Authenticated Key Exchange. International Journal for Research Publication and Seminar, 7(6), 41–47. Retrieved from https://jrps.shodhsagar.com/index.php/j/article/view/904

Issue

Section

Original Research Article