earticle

논문검색

Ensuring Data Confidentiality and Authentication through Encryption at Application Layer

초록

영어

Cloud computing has emerged as a powerful and viable architecture to meet large-scale and complex computational needs of the organizations. It extends the IT capability by providing on-demand access to computer resources for dedicated use. Data security and privacy are the major concerns over the cloud from user perspective. Consequently, the organizations which deal with cloud computing should amicably address the key data security risks. In this paper, a generic scheme of user authentication and data confidentiality has been introduced. We introduce a tool that encrypts/decrypts the user data at application layer using public key infrastructure. The information security experts of both the sides i.e. cloud users and service providers must comprehend and address the risk and security issues in detail before actually benefiting high-end computing power offered by the cloud computing paradigm.

목차

Abstract
 1. Introduction
  1.1 Cryptography
  1.2 Public Key Infrastructure (PKI)
  1.3 OSI Model
  1.4 Cloud Computing
 2. Literature Review
 3. Problem Statement and Research Motivation
 4. Proposed Model
  4.1 Authentication/Authorization
  4.2 Storage Server
  4.3 Encryption/Decryption Tool
  4.4 Web Server
 5. Experimentations
  5.1 The 1MB limit
  5.2 What about HTTPS?
  5.3 How Secure is It?
 6. Conclusion
 References

저자정보

  • Kaleem Ullah Shaheed Zulfikar Ali Bhutto Institute of Science and Technology (SZABIST) Islamabad, Pakistan
  • M.N.A. Khan Shaheed Zulfikar Ali Bhutto Institute of Science and Technology (SZABIST) Islamabad, Pakistan

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.