Design an efficient three-party authenticated key exchange protocol in the cloud environment

Size: px
Start display at page:

Download "Design an efficient three-party authenticated key exchange protocol in the cloud environment"

Transcription

1 Design an efficient three-party authenticated key exchange protocol in the cloud environment Chung-Yi Lin a, *, Yuh-Min Chen a, Shu-Yi Liaw b, Chen-Hua Fu c a Institute of Manufacturing Information Systems, National Cheng Kung University, Tainan, ROC b Department of usiness dministration, National Pingtung University Science Technology, Pingtung, ROC c Department of Information Management, National Defense University, Taipei, ROC * Corresponding author address: p @gmailcom STRCT With the emergence of cloud, conventional threeparty authenticated key exchange (3PKE) protocols face two common problems; one is that the server users are not in the same domain, therefore, the shared authenticated keys may be unknowingly compromised The other problem is these protocols require higher on-line computation cost on-line communication cost during session key agreement, which can create excessive overhead for cloud clients using devices with low computational capacity This paper proposes a novel protocol based on the self-verified token pair scheme employed by Chen et al The proposed protocol does not require that the authenticated keys be stored in clouds to achieve user authentication Furthermore, it overcomes the security threats existing in the protocol developed by Chen et al improves the performance in session key agreement to make it suitable for 3PKE in cloud environments Keywords: 3PKE, uthenticated key exchange, Cloud environment I INTRODUCTION Since the first key exchange protocol was proposed by Diffie Hellman [1], a number of researchers have proposed schemes with similar authentication functions such as [2][3][4][5] Steiner et al proposed that users share their authenticated keys with a trusted server for mutual authentications in subsequent session key agreements [6] This became known as the three-party authenticated key exchange (3PKE) protocol However, the protocol developed by Steiner et al is unable to detect on-line guessing or off-line password-guessing attacks To eliminate the threat of such attacks, some schemes using server public keys such as [7][8] Nevertheless, these schemes rely on public-key infrastructure create excessive computational overhead, making them unsuitable for environments with limited computational resources lthough recent 3PKE protocols such as [9][10][11][12] do not use server public keys, the emergence of cloud presents new challenges First of all, the server the users are not necessarily in the same trusted domain Even if a cloud could replace the server assist two communication parties in mutual authentication, storing the shared authenticated keys in the cloud would pose the risk of keys being compromised The equipment used by cloud clients, such cell phones e-readers, are extremely limited with regard to computational capabilities, memory, communication bwidth, battery power [13][14] The means of adapting conventional 3PKE protocols to cloud environments is thus an issue worthy of further investigation For cloud clients using 3PKE with such devices, we concur that some of the systems applications may be required to expend on-line resources for computation communication simultaneously, which could lead to excessive overhead Chen et al proposed a protocol with a self-verified token pair scheme that does not require the additional storage of sensitive tables in the server to achieve user authentication [15] In this scheme, the server hides the secret key derived in the self-verified token pair given to a specific user Subsequently, the server requires only its private key the self-verified token pair sent by the user to obtain the shared authenticated key This provides an ideal method to secure authenticated keys stored in clouds; however, Yang Chang pointed out that this protocol is unable to withst stolen-verifier attacks [16] Nose further noted that once an adversary obtains an authenticated key, a key-compromise impersonation attack can be initiated [17] Yang Chang also pointed out that the protocol proposed by Chen et al requires higher on-line computational costs communication loads in reaching session key agreement, therefore, the protocol is inappropriate for the limited resources of mobile devices To develop a 3PKE protocol suitable for cloud environments, this paper proposes a novel protocol based on the scheme established by Chen et al with the objective of obtaining better security performance in session key agreement II PRELIMINRIES System model Figure1 illustrates the proposed system model The participating parties include Initiator, Responder, the cloud To achieve mutual authentication, must register with the cloud to obtain the respective authenticated keys that the cloud shares with them eforeh, generate the rom exponents components required to produce the session key as well as the verification values of their components During session key agreement, exchange their components, through the cloud, they exchange the verification values of their components When receive the verification value, they use it to verify the integrity of the component sent to them earlier Subsequently, when wish to establish secure communication at a specific time, they can use their own rom exponent the component from the other party to generate a common session key

2 Initiator Cloud Responder Step 3 retrieves Step 4 rn c _ rn h psw computes c _ sk sk k1 rn k 1 h psw, rn Step 5 saves c sk, tok1 _ s component s verification value of component s component s verification value of component undergoes the same procedure saves c _ sk, tok1 Figure 1 Conceptual model TLE I NOTTIONS Security requirements We assume that two types of adversaries exist in the environment: illegal (unregistered) malicious users, referred to as external adversaries, legal (registered) malicious users, referred to as internal adversaries oth types of adversary may attempt to steal the shared authenticated keys private rom exponents through stolen-verifier attacks to enable impersonation attacks crack session keys Internal adversaries may also try to impersonate Initiator or Responder through cloud authentication during session key agreement, thereby tricking the other party into opening a session with them In view of the above, we conclude that the security requirements include (1) ensuring the confidentiality of the shared authenticated keys the private rom exponents to oppose stolen-verifier attacks (2) ensuring that internal adversaries are unable to perform impersonation-of-initiator attacks or impersonation-of-responder attacks III PROPOSED PROTOCOLS The notation used in the proposed protocol is presented in TableⅠ Sections describe the phase, procedures computation steps Initialization phase In this phase, perform the same procedures Take for instance 1) Registration procedure: Prior to this procedure, must first select generate a rom number before Then, applies for registration in the cloud: c _ rn rn h psw rn 1 rn q psw Step 1 The cloud generates a rom number sk H, 1 q computes ID Step 2 Cloud computes g mod p generates selfverified token pair through Then, cloud delivers to tok 1 h, ID tok1 q tok2 x tok1 mod sk, tok1, tok2 Notations Definition h a collision-free one way hash function the exclusive operator the concatenation operator p, q two large primes, whereby g x sk, sk tok1 tok1 ra, ra R, R k1, k1 a generator, g q 1mod p q p 1 in Z * p the private key of the cloud the authenticated keys generated by the cloud shared with, the self-verified token pairs generated by the cloud for, the rom exponents generated by, the components of session key generated by, the encryption keys used by, to encrypt their authenticated key k2, k2 the encryption keys used by, to encrypt their v, v vc, vc v _ R, v _ R 2) Pre-process procedure: Step 1 Step 2 rom component identity verification values generated by identity verification values generated by the cloud to give to the verification values generated by for their component generates one time rom number ra computes R g mod p retrieves by k 2 h rn, psw rn c _ rn h psw rn Step 3 computes into n blocks with the same bit-, such as, Step 4 divides lengths as computes Step 5 R saves ra k2 ra Z * p r 1, r2,, rn c1,, cn r1 k2, rn k2 R c1,, cn, undergoes the same procedure saves c _, ra KE phase: 1) Round 1:

3 Step1 retrieves k 1 hpsw, rn Step2 retrieves Step3 generates Step4 generates identity verification value Step5 sends to the cloud, respectively k1 sk c _ sk k1 v _ R h ID, R T sk v _ R v h ID, T, v _ R, sk rn c _ rn h psw R ID, ID, ID, T, v _ R, v, tok1 2) Round 2: Upon receiving the message delivered by, does the following: k1 Step 1 retrieves Step 2 retrieves sk Step 3 generates Step 4 generates identity verification value Step 5 sends to the cloud, respectively, saves temporarily Similarly, upon receiving the message from, saves temporarily rn c _ rn h psw sk c _ sk k1 v _ R h ID, R T v h ID, T, v _ R, sk v _ R k 1 h psw, rn ID, R ID, ID, T, v _ R, v, tok1 R R 3) Round 3: fter receiving the messages from, the cloud follows the steps below: Step1 The cloud authenticates Step11 Step12 The cloud verifies whether the timestamps respectively created by are fresher than those of the last request The cloud retrieves sk ' H, ' Similarly, the cloud sk' ' tok2 xtok1 mod q also ID retrieves sk' by ' tok2 xtok1 mod q sk ' H ID, ' Step13 The cloud verifies v v, such as v?hid,t,v _ R,sk' v?h ID,T,v _ R,sk' Step14 The cloud generates vc H ID,v_ R,sk' vc H ID respectively Step15 The cloud sends ID, ID, vc vc vc,v _ R,sk' ID, ID, vc, such as for, to, respectively Upon receiving the message from the cloud, respectively use R R to verify vc vc,such as vc?hid,hid,r, sk If they pass verification, then, vc?h ID,h ID,R sk R R confirm the integrity of Thereafter, when wish the establish secure communication at a given time, computes, retrieves rn c _ rn h psw ra k 2 h rn, psw, obtains the common session key session key retrieves ra ra c1 k2 cn k2 R ra mod p In the same manner, obtains the common session key by session key p R ra mod IV SECURITY NLYSIS In this section, we assess whether the proposed protocol meets the security requirements efore the security demonstration, we emphasize the following facts to assist in security analysis: (1) discrete logarithm problems (DLP) D-H problems (DHP) are difficult to solve, (2) one way hash functions are collision-free irreversible, (3) clouds can protect their private keys from being compromised These are widely accepted baselines in security Furthermore, we assume that one way hash functions rom number algorithms are sufficiently secure have the same bit-lengths In addition to the original parties,, the cloud, the parties of the security demonstration also include external adversary internal adversary Proposition1: The proposed protocol can withst stolen-verifier attacks We use party is attacked as an example The proof of our proposition is as follows To ensure the confidentiality of authenticated key rom exponent, computes to generate encryption keys k2 Then, uses to encrypt sk as uses k2 to encrypt the blocks divided from, thereby deriving s or use the same attack approaches, we will explain the attack using an attack by as an example Suppose attacks steals c _ sk, c _ ra, k 1 h psw, rn sk k1 c _ sk sk k1 r1 k1,, rn k1 c _ rn k2 c _ rn k 2 h rn, psw ra To obtain sk ra k1 ra, must first gain k1 rn from h psw, cannot know Therefore, attempts to gain psw or ecause c _ rn rn

4 either or Even if performs a brute force attack, they cannot differentiate the real or from Consequently, can only guess Say are both 128 bits The chances of correctly guessing or is 1/2 128, thus, it is unlikely that will be able to derive or This demonstrates that the proposed protocol can achieve our proposition k2 psw rn psw rn psw c _ rn rn k1 The protocol can withst impersonation attacks The proof of Proposition 1 shows that neither nor can obtain the authenticated key of s a result, they cannot pass the authentication of the cloud with messages forged as though they were from However, possesses a shared authenticated key with which both impersonation-of-initiator impersonation-of-responder attacks could be attempted elow is our proof with regard to Proposition 2 CSE 1 Impersonation-of-initiator attack: Suppose impersonates attempts to establish a session with sends to the cloud, respectively Upon receiving the message, sends to the cloud, respectively Subsequently, must intercept messages from the channel between tamper with the message from the channel between the cloud by changing it to in an attempt to pass the authentication of the cloud will think that they are establishing a session with when in fact they are doing so with However, cannot impersonate because the verification value generated by is ; if changed to, the cloud would discover that v hid,t,c_ R, sk s a result, would be unable to pass the authentication of the cloud ID, ID, T, c _ R, v, tok1, tok 2 ID, v _ R v h ID ID, v _ R ID, ID, T, c_ R, v, tok1 ID,ID,T,cR,v, tok1,t,c _ R, sk ID ID CSE 2 Impersonation-of-responder attack: Supposing wishes to establish a session with, sends ID, v _ R ID, ID, T, c _ R, v, tok1, tok2 to the cloud, respectively tampers with the message from the communication channel between the cloud by changing it to intercepts the messages in the communication channel between Moreover, sends ID, ID, T, c _ R, v, tok1 ID, ID, T, c_ R, v, tok1, tok 2 ID, v _ R to the cloud, respectively, in an attempt to pass the authentication of the cloud make think a session is being established with, when in fact the session is with However, is unable to impersonate because the verification value generated by is v hid, T, c _ R, sk ; if changed ID to ID, the cloud would discover that s a result, would be unable to pass the authentication of the cloud v h ID, T, c _ R, sk V EFFICIENCY NLYSIS We compared the proposed protocol with that proposed by Chen et al with regard to performance in communication costs on-line computation costs Communication cost We compared the communication costs of the two protocols with regard to communication efficiency the size of messages being transmitted 1) Communication efficiency: We used the number of rounds times of communication to examine the communication efficiency of the protocol The proposed protocol requires 3 rounds 6 communications In contrast, the protocol proposed by Chen et al requires 3 rounds 7 communications The protocol proposed in this paper demonstrates superior communication efficiency 2) Message transmission size: Chen et al assumed that the sizes of q are 1,024 bits 160 bits, the output size of one way hash function is 128 bits, the size of the timestamp is 96 bits, the size of ID is negligible We thus compared the sizes of messages transmitted from 3 rounds using the proposed protocol that proposed by Chen et al based on the aforementioned assumptions Figure 2 presents the results In both the first second rounds, the costs of the proposed protocol were * bits, whereas in the third round, the cost was 2*128 bits Thus, the total size of messages transmitted was 3584 bits This result is approximately 2240 bits smaller than that using the protocol proposed by Chen et al On-line computation cost: The session key agreement requires on-line computation; therefore, we compared the proposed protocol that proposed by Chen et al with regard to the computation costs required in the KE phase The symbols used to analyze the computation cost are presented in Table Ⅱ s introduced in previous studies as [18][19][20], the relationships of the various computation costs can be determined as shown in Table Ⅲ Table Ⅳ compares the total computation costs required by,, the server (cloud) in the proposed protocol that proposed by Chen et al Figure 3 displays the computation costs required in each round To facilitate the comparisons in Figure 3, we converted the costs of T EXP T MUL into cost of T H The results of the comparisons indicate that the proposed protocol imposes significantly lower computation costs than that proposed by Chen et al with the exception of the cloud, which induces computation costs higher than those of the server in the protocol developed by Chen et al Regardless, clouds are likely to have greater computation capabilities, therefore, such costs will not cause excessive computational overhead p

5 Symbol T EXP T MUL T DD T H T Figure 2 Comparison of size of messages transmitted TLE II SYMOLS USED TO NLYZE COMPUTTION COSTS Definition Cost of one modular exponential operation Cost of one modular multiplication operation Cost for one modular addition operation Cost of one hash function operation Cost of one exclusive OR operation TLE III RELTIONSHIPS MONG VRIOUS OPERTIONS 3PKE Chen et al 1 T EXP 240 T MUL 1 T EXP 600 T H 1 T H 04 T MUL T DD is negligible T is negligible TLE IV COMPRISON OF COMPUTTIONL COSTS 2T EXP+ 4T H 2T EXP+ 4T H proposed 7T H 7T H Computation cost Server (Cloud) 2T MUL+ 6T H 2T MUL+ 12T H Total 4T EXP+2T MUL+ 14T H 2T MUL+26T H Figure 3 Comparison of computational costs required in each round The above analysis demonstrates that the proposed protocol has better communication efficiency transmits smaller messages that the protocol developed by Chen et al Furthermore, in the KE phase, the proposed protocol significantly reduces computational costs for the two communication parties with regard to session key agreement VI CONCLUSION The objective of this paper was to improve the protocol proposed by Chen et al in terms of security performance during session key agreement to make it applicable to 3PKE in cloud environments Security analysis shows that the proposed protocol is able to withst stolen-verifier attacks as well as impersonation attacks Efficiency analysis indicates that the proposed protocol has higher communication efficiency transmits smaller messages than the protocol developed by Chen et al In addition, the proposed protocol significantly reduces the overhead of on-line computation for the two communication parties during session key agreement We can thus conclude that the proposed protocol is suitable for 3PKE in cloud environments This paper assumes that the cloud is honest follows the required security service agreement However, malicious clouds are still possible, we therefore plan to develop a 3PKE protocol capable of withsting malicious attacks even from the clouds themselves REFERENCES [1] W Diffie, MHellman, New directions in cryptography, IEEE Trans Inform Theory, vol 22, pp644 54, 1976 [2] SM ellovin, M Merrit, Encrypted key exchanged: Password-based protocols secure against dictionary attacks, in: Proc of IEEE Symposium on Security Privacy, pp72 84, 1992 [3] V oyko, P Mackenzie, S Patel, Provably secure password authenticated key exchange using Diffie- Hellman, in: Proceedings of EUROCRYPT 2000, dvances in Cryptology Springer-Verlag, pp , 2000 [4] O Goldreich, Y Lindell, Session-key generation using human passwords only, in: Proceedings of CRYPTO 2001, dvances in Cryptology Springer- Verlag, vol 2139, pp , 2001 [5] R Gennaro, Y Lindell, framework for passwordbased authenticated key exchange, In: Proceedings of EUROCRYPT 2003, dvances in Cryptology Springer- Verlag, vol 2656, pp , 2003 [6] M Steiner, G Tsudik, M Waidner, Refinement extension of encrypted key exchange,, CM SIGOPS Operating Systems Review, vol 29, pp22-30, 1995 [7] CL Lin, HM Sun, THwang, Three-party encrypted key exchange: attacks a solution, CM SIGOPS Operating System Review, vol 34, pp12-20, 2000 [8] H-M Sun, -C Chen, T, Hwang, Secure key agreement protocols for three-party against guessing attacks, The Journal of Systems Software, vol 75, pp63-68, 2005 [9] R Lu, Z Cao, Simple three-party exchange protocol, Computers & Security, vol 26, pp94-97, 2007 [10] TF Lee, T Hwang, Simple password-based three-party authenticated key exchange without server public keys, Information Sciences, vol180, pp , 2010 [11] TY Chang, MS Hwang, WP Yang, communication-efficient three-party password authenticated key exchange protocol, Information Sciences, vol 181, pp , 2011 [12] C Lv, M Ma, H Li, J Ma, Y Zhang, n novel threeparty authenticated key exchange protocol using one-time key, Journal of Network Computer pplication, vol 36, pp , 2013

6 [13] M Conti, et al, Looking ahead in pervasive : Challenges opportunities in the era of cyber physical convergence, Journal of Pervasive Mobile Computing, vol 8, pp2-21, 2012 [14] Q Shi, N Zhang, D-L Jones, Efficient autonomous signature exchange on ubiquitous networks, Journal of Network Computer pplication, vol35, pp , 2012 [15] TZ Chen, W Lee, H Chen, round- computation-efficient three-party authenticated key exchange protocol, The Journal of Systems Software, vol 81, pp , 2008 [16] JH Yang, CC Chang, n efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments, The Journal of Systems Software, vol 82, pp , 2009 [17] P Nose, Security weaknesses of authenticated key agreement protocols, Information Processing Letters, vol 111, pp , 2011 [18] YP Liao, SS Wang, secure dynamic ID based remote user authentication scheme for multi-server environment, Computer Stards & Interfaces, vol31, pp24-29, 2009 [19] Z Li, J Higgins, M Clement, Performance of finite field arithmetic in an elliptic curve cryptosystem, IEEE Computer Society, pp , 2001 [20] RC Wang, WS Juang, CL Lei, Web Metering Scheme for Fair dvertisement Transactions, International Journal of Security Its pplications, vol 2, pp49-56, 2008

MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS

MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS Kanchupati Kondaiah 1, B.Sudhakar 2 1 M.Tech Student, Dept of CSE,

More information

A More Robust Authentication Scheme for Roaming Service in Global Mobility Networks Using ECC

A More Robust Authentication Scheme for Roaming Service in Global Mobility Networks Using ECC International Journal of Network Security, Vol.18, No.2, PP.217-223, Mar. 2016 217 A More Robust Authentication Scheme for Roaming Service in Global Mobility Networks Using ECC Dianli Guo and Fengtong

More information

An Improved Authentication Protocol for Session Initiation Protocol Using Smart Card and Elliptic Curve Cryptography

An Improved Authentication Protocol for Session Initiation Protocol Using Smart Card and Elliptic Curve Cryptography ROMANIAN JOURNAL OF INFORMATION SCIENCE AND TECHNOLOGY Volume 16, Number 4, 2013, 324 335 An Improved Authentication Protocol for Session Initiation Protocol Using Smart Card and Elliptic Curve Cryptography

More information

Capture Resilient ElGamal Signature Protocols

Capture Resilient ElGamal Signature Protocols Capture Resilient ElGamal Signature Protocols Hüseyin Acan 1, Kamer Kaya 2,, and Ali Aydın Selçuk 2 1 Bilkent University, Department of Mathematics [email protected] 2 Bilkent University, Department

More information

A novel deniable authentication protocol using generalized ElGamal signature scheme

A novel deniable authentication protocol using generalized ElGamal signature scheme Information Sciences 177 (2007) 1376 1381 www.elsevier.com/locate/ins A novel deniable authentication protocol using generalized ElGamal signature scheme Wei-Bin Lee a, Chia-Chun Wu a, Woei-Jiunn Tsaur

More information

Efficient Nonce-based Authentication Scheme for. session initiation protocol

Efficient Nonce-based Authentication Scheme for. session initiation protocol International Journal of Network Security, Vol.9, No.1, PP.12 16, July 2009 12 Efficient Nonce-based Authentication for Session Initiation Protocol Jia Lun Tsai Degree Program for E-learning, Department

More information

SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER

SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER Mrs. P.Venkateswari Assistant Professor / CSE Erode Sengunthar Engineering College, Thudupathi ABSTRACT Nowadays Communication

More information

Index-Terms - S-Box Key Exchange, DSKE Method, And Three Layer Security, Modified Diffie-Hellman Key Exchange.

Index-Terms - S-Box Key Exchange, DSKE Method, And Three Layer Security, Modified Diffie-Hellman Key Exchange. Secured and Authenticated Communication in Cloud Using Dynamic Key Exchange Protocol Abstract -Cloud computing is a new type of service which provides large scale computing resources to each customer.

More information

On the Limits of Anonymous Password Authentication

On the Limits of Anonymous Password Authentication On the Limits of Anonymous Password Authentication Yan-Jiang Yang a Jian Weng b Feng Bao a a Institute for Infocomm Research, Singapore, Email: {yyang,baofeng}@i2r.a-star.edu.sg. b School of Computer Science,

More information

Efficient nonce-based authentication scheme for Session Initiation Protocol

Efficient nonce-based authentication scheme for Session Initiation Protocol Efficient nonce-based authentication scheme for Session Initiation Protocol Jia Lun Tsai National Chiao Tung University, Taiwan, R.O.C. [email protected] Abstract: In recent years, Session Initiation

More information

Single Sign-On Secure Authentication Password Mechanism

Single Sign-On Secure Authentication Password Mechanism Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,

More information

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,

More information

NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES

NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES Ounasser Abid 1, Jaouad Ettanfouhi 2 and Omar Khadir 3 1,2,3 Laboratory of Mathematics, Cryptography and Mechanics, Department of Mathematics, Fstm,

More information

SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT

SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT K.karthika 1, M. Daya kanimozhi Rani 2 1 K.karthika, Assistant professor, Department of IT, Adhiyamaan College of Engineering, Hosur

More information

CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME

CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME Mohammed Aijaz Ahmed 1, D. Rajya Lakshmi 2 and Sayed Abdul Sattar 3 1 Department of Computer Science and

More information

A Stubborn Security Model Based on Three-factor Authentication and Modified Public Key

A Stubborn Security Model Based on Three-factor Authentication and Modified Public Key International Journal of Network Security, Vol.18, No.6, PP.1060-1070, Nov. 2016 1060 A Stubborn Security Model Based on Three-factor Authentication and Modified Public Key Trung Thanh Ngo and Tae-Young

More information

CRYPTOGRAPHY IN NETWORK SECURITY

CRYPTOGRAPHY IN NETWORK SECURITY ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can

More information

Cryptanalysis and security enhancement on the generation of Mu-Varadharajan electronic voting protocol. Vahid Jahandideh and Amir S.

Cryptanalysis and security enhancement on the generation of Mu-Varadharajan electronic voting protocol. Vahid Jahandideh and Amir S. 72 Int. J. Electronic Governance, Vol. 3, No. 1, 2010 Cryptanalysis and security enhancement on the generation of Mu-Varadharajan electronic voting protocol Vahid Jahandideh and Amir S. Mortazavi Department

More information

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN

More information

Secure Authentication of Distributed Networks by Single Sign-On Mechanism

Secure Authentication of Distributed Networks by Single Sign-On Mechanism Secure Authentication of Distributed Networks by Single Sign-On Mechanism Swati Sinha 1, Prof. Sheerin Zadoo 2 P.G.Student, Department of Computer Application, TOCE, Bangalore, Karnataka, India 1 Asst.Professor,

More information

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the

More information

Secure File Transfer Using USB

Secure File Transfer Using USB International Journal of Scientific and Research Publications, Volume 2, Issue 4, April 2012 1 Secure File Transfer Using USB Prof. R. M. Goudar, Tushar Jagdale, Ketan Kakade, Amol Kargal, Darshan Marode

More information

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures Outline Computer Science 418 Digital Signatures Mike Jacobson Department of Computer Science University of Calgary Week 12 1 Digital Signatures 2 Signatures via Public Key Cryptosystems 3 Provable 4 Mike

More information

A secure email login system using virtual password

A secure email login system using virtual password A secure email login system using virtual password Bhavin Tanti 1,Nishant Doshi 2 1 9seriesSoftwares, Ahmedabad,Gujarat,India 1 {[email protected]} 2 SVNIT, Surat,Gujarat,India 2 {[email protected]}

More information

Cryptography. Debiao He. School of Mathematics and Statistics, Wuhan University, Wuhan, People s Republic of China. hedebiao@163.

Cryptography. Debiao He. School of Mathematics and Statistics, Wuhan University, Wuhan, People s Republic of China. hedebiao@163. Weakness in a Mutual Authentication cheme for ession Initiation Protocol using Elliptic Curve Cryptography Debiao He chool of Mathematics and tatistics, Wuhan University, Wuhan, People s Republic of China

More information

A Factoring and Discrete Logarithm based Cryptosystem

A Factoring and Discrete Logarithm based Cryptosystem Int. J. Contemp. Math. Sciences, Vol. 8, 2013, no. 11, 511-517 HIKARI Ltd, www.m-hikari.com A Factoring and Discrete Logarithm based Cryptosystem Abdoul Aziz Ciss and Ahmed Youssef Ecole doctorale de Mathematiques

More information

Client Server Registration Protocol

Client Server Registration Protocol Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are

More information

Securing MANET Using Diffie Hellman Digital Signature Scheme

Securing MANET Using Diffie Hellman Digital Signature Scheme Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 [email protected] 2

More information

A Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications

A Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications A Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications G.Prakash #1, M.Kannan *2 # Research Scholar, Information and Communication Engineering, Anna University

More information

Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud

Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud M.Jayanthi, Assistant Professor, Hod of MCA.E mail: [email protected] MahatmaGandhi University,Nalgonda, INDIA. B.Ranganatha

More information

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Bhanu Prakash Chamakuri*1, D. Srikar*2, Dr. M.Suresh Babu*3 M.Tech Scholar, Dept of CSE, Grandhi Varalakshmi Institute Of Technology,

More information

A SMART CARD-BASED MOBILE SECURE TRANSACTION SYSTEM FOR MEDICAL TREATMENT EXAMINATION REPORTS. Received January 2010; revised May 2010

A SMART CARD-BASED MOBILE SECURE TRANSACTION SYSTEM FOR MEDICAL TREATMENT EXAMINATION REPORTS. Received January 2010; revised May 2010 International Journal of Innovative Computing, Information and Control ICIC International c 2011 ISSN 1349-4198 Volume 7, Number 5(A), May 2011 pp. 2257 2267 A SMART CARD-BASED MOBILE SECURE TRANSACTION

More information

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two

More information

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION Hasna.R 1, S.Sangeetha 2 1 PG Scholar, Dhanalakshmi Srinivasan College of Engineering, Coimbatore. 2 Assistant Professor, Dhanalakshmi Srinivasan

More information

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. P.Srinivas *,K. Rajesh Kumar # M.Tech Student (CSE), Assoc. Professor *Department of Computer Science (CSE), Swarnandhra College of Engineering

More information

Security in Electronic Payment Systems

Security in Electronic Payment Systems Security in Electronic Payment Systems Jan L. Camenisch, Jean-Marc Piveteau, Markus A. Stadler Institute for Theoretical Computer Science, ETH Zurich, CH-8092 Zurich e-mail: {camenisch, stadler}@inf.ethz.ch

More information

Authentication Types. Password-based Authentication. Off-Line Password Guessing

Authentication Types. Password-based Authentication. Off-Line Password Guessing Authentication Types Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4:

More information

Public Key Cryptography. c Eli Biham - March 30, 2011 258 Public Key Cryptography

Public Key Cryptography. c Eli Biham - March 30, 2011 258 Public Key Cryptography Public Key Cryptography c Eli Biham - March 30, 2011 258 Public Key Cryptography Key Exchange All the ciphers mentioned previously require keys known a-priori to all the users, before they can encrypt

More information

WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES

WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES Balachandra Muniyal 1 Krishna Prakash 2 Shashank Sharma 3 1 Dept. of Information and Communication Technology, Manipal Institute of Technology, Manipal

More information

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application

More information

A blind digital signature scheme using elliptic curve digital signature algorithm

A blind digital signature scheme using elliptic curve digital signature algorithm A blind digital signature scheme using elliptic curve digital signature algorithm İsmail BÜTÜN * and Mehmet DEMİRER *Department of Electrical Engineering, University of South Florida, Tampa, FL, USA Department

More information

Electronic Contract Signing without Using Trusted Third Party

Electronic Contract Signing without Using Trusted Third Party Electronic Contract Signing without Using Trusted Third Party Zhiguo Wan 1, Robert H. Deng 2 and David Lee 1 Sim Kim Boon Institute for Financial Economics 1, School of Information Science 2, Singapore

More information

SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS

SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS Abstract: The Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential

More information

Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card

Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card C. Koner, Member, IACSIT, C. T. Bhunia, Sr. Member, IEEE and U. Maulik, Sr. Member, IEEE

More information

Improved Online/Offline Signature Schemes

Improved Online/Offline Signature Schemes Improved Online/Offline Signature Schemes Adi Shamir and Yael Tauman Applied Math. Dept. The Weizmann Institute of Science Rehovot 76100, Israel {shamir,tauman}@wisdom.weizmann.ac.il Abstract. The notion

More information

Security and Privacy Flaws in a Recent Authentication Protocol for EPC C1 G2 RFID Tags

Security and Privacy Flaws in a Recent Authentication Protocol for EPC C1 G2 RFID Tags Security and Privacy Flaws in a Recent Authentication Protocol for EPC C1 G2 RFID Tags Seyed Mohammad Alavi 1, Karim Baghery 2 and Behzad Abdolmaleki 3 1 Imam Hossein Comprehensive University Tehran, Iran

More information

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,

More information

Two Factor Zero Knowledge Proof Authentication System

Two Factor Zero Knowledge Proof Authentication System Two Factor Zero Knowledge Proof Authentication System Quan Nguyen Mikhail Rudoy Arjun Srinivasan 6.857 Spring 2014 Project Abstract It is often necessary to log onto a website or other system from an untrusted

More information

Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring

Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring Eli Biham Dan Boneh Omer Reingold Abstract The Diffie-Hellman key-exchange protocol may naturally be extended to k > 2

More information

A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags

A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags Sarah Abughazalah, Konstantinos Markantonakis, and Keith Mayes Smart Card Centre-Information Security Group (SCC-ISG) Royal Holloway,

More information

Blinding Self-Certified Key Issuing Protocols Using Elliptic Curves

Blinding Self-Certified Key Issuing Protocols Using Elliptic Curves Blinding Self-Certified Key Issuing Protocols Using Elliptic Curves Billy Bob Brumley Helsinki University of Technology Laboratory for Theoretical Computer Science [email protected] Abstract Self-Certified

More information

Signature Amortization Technique for Authenticating Delay Sensitive Stream

Signature Amortization Technique for Authenticating Delay Sensitive Stream Signature Amortization Technique for Authenticating Delay Sensitive Stream M Bruntha 1, Dr J. Premalatha Ph.D. 2 1 M.E., 2 Professor, Department of Information Technology, Kongu Engineering College, Perundurai,

More information

The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network

The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network R.Anbarasi 1, S.Gunasekaran 2 P.G. Student, Department of Computer Engineering, V.S.B Engineering College, Karur,

More information

Chapter 16: Authentication in Distributed System

Chapter 16: Authentication in Distributed System Chapter 16: Authentication in Distributed System Ajay Kshemkalyani and Mukesh Singhal Distributed Computing: Principles, Algorithms, and Systems Cambridge University Press A. Kshemkalyani and M. Singhal

More information

Efficient Unlinkable Secret Handshakes for Anonymous Communications

Efficient Unlinkable Secret Handshakes for Anonymous Communications 보안공학연구논문지 (Journal of Security Engineering), 제 7권 제 6호 2010년 12월 Efficient Unlinkable Secret Handshakes for Anonymous Communications Eun-Kyung Ryu 1), Kee-Young Yoo 2), Keum-Sook Ha 3) Abstract The technique

More information

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure) Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.

More information

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23 Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest

More information

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui School of Engineering and Computer Science Te Kura Mātai Pūkaha, Pūrorohiko PO Box 600 Wellington New Zealand Tel: +64 4 463

More information

Secure Data Management Scheme using One-Time Trapdoor on Cloud Storage Environment

Secure Data Management Scheme using One-Time Trapdoor on Cloud Storage Environment , pp.257-272 http://dx.doi.org/10.14257/ijsia.2014.8.1.24 Secure Data Management Scheme using One-Time Trapdoor on Cloud Storage Environment Sun-Ho Lee and Im-Yeong Lee 1 Department of Computer Software

More information

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash

More information

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE International Journal of Computer Network and Security(IJCNS) Vol 7. No.1 2015 Pp. 1-8 gopalax Journals, Singapore available at : www.ijcns.com ISSN: 0975-8283 ----------------------------------------------------------------------------------------------------------------------------------------------------------

More information

On the Security Vulnerabilities of a Hash Based Strong Password Authentication Scheme

On the Security Vulnerabilities of a Hash Based Strong Password Authentication Scheme On the Security Vulnerabilities of a Hash Based Strong Password Authentication Scheme Manoj Kumar Department of Mathematics R. K. College Shamli-Muzaffarnagar,.P.-India - 247776 E-mail: yamu [email protected]

More information

Improving data integrity on cloud storage services

Improving data integrity on cloud storage services International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services

More information

Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol

Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol Formal Analysis of A Novel Mutual Authentication and ey Agreement Protocol Ja'afer M. AL-Saraireh Applied Science University Amman 11961, Jordan Saleh S. Saraireh Philadelphia University Amman 11961, Jordan

More information

Overview of Public-Key Cryptography

Overview of Public-Key Cryptography CS 361S Overview of Public-Key Cryptography Vitaly Shmatikov slide 1 Reading Assignment Kaufman 6.1-6 slide 2 Public-Key Cryptography public key public key? private key Alice Bob Given: Everybody knows

More information

An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method

An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method E.Sathiyamoorthy 1, S.S.Manivannan 2 1&2 School of Information Technology and Engineering

More information

CUNSHENG DING HKUST, Hong Kong. Computer Security. Computer Security. Cunsheng DING, HKUST COMP4631

CUNSHENG DING HKUST, Hong Kong. Computer Security. Computer Security. Cunsheng DING, HKUST COMP4631 Cunsheng DING, HKUST Lecture 08: Key Management for One-key Ciphers Topics of this Lecture 1. The generation and distribution of secret keys. 2. A key distribution protocol with a key distribution center.

More information

Strengthen RFID Tags Security Using New Data Structure

Strengthen RFID Tags Security Using New Data Structure International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University

More information

Comments on "public integrity auditing for dynamic data sharing with multi-user modification"

Comments on public integrity auditing for dynamic data sharing with multi-user modification University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers Faculty of Engineering and Information Sciences 2016 Comments on "public integrity auditing for dynamic

More information

SENSE Security overview 2014

SENSE Security overview 2014 SENSE Security overview 2014 Abstract... 3 Overview... 4 Installation... 6 Device Control... 7 Enrolment Process... 8 Authentication... 9 Network Protection... 12 Local Storage... 13 Conclusion... 15 2

More information

A Novel Approach for Signing Multiple Messages: Hash- Based Signature

A Novel Approach for Signing Multiple Messages: Hash- Based Signature International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 15 (2014), pp. International Research Publications House http://www. irphouse.com A Novel Approach for Signing

More information

A Layered Signcryption Model for Secure Cloud System Communication

A Layered Signcryption Model for Secure Cloud System Communication Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.1086

More information

Chapter 6: Fundamental Cloud Security

Chapter 6: Fundamental Cloud Security Chapter 6: Fundamental Cloud Security Nora Almezeini MIS Department, CBA, KSU From Cloud Computing by Thomas Erl, Zaigham Mahmood, and Ricardo Puttini(ISBN: 0133387526) Copyright 2013 Arcitura Education,

More information

Near Sheltered and Loyal storage Space Navigating in Cloud

Near Sheltered and Loyal storage Space Navigating in Cloud IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata

More information

Module 7 Security CS655! 7-1!

Module 7 Security CS655! 7-1! Module 7 Security CS655! 7-1! Issues Separation of! Security policies! Precise definition of which entities in the system can take what actions! Security mechanism! Means of enforcing that policy! Distributed

More information

SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC

SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC Ferozepur, Punjab, India Email: 1 [email protected], 2 [email protected]

More information

A Secure Decentralized Access Control Scheme for Data stored in Clouds

A Secure Decentralized Access Control Scheme for Data stored in Clouds A Secure Decentralized Access Control Scheme for Data stored in Clouds Priyanka Palekar 1, Abhijeet Bharate 2, Nisar Anjum 3 1 SKNSITS, University of Pune 2 SKNSITS, University of Pune 3 SKNSITS, University

More information

Biometric Authentication Platform for a Safe, Secure, and Convenient Society

Biometric Authentication Platform for a Safe, Secure, and Convenient Society 472 Hitachi Review Vol. 64 (2015), No. 8 Featured Articles Platform for a Safe, Secure, and Convenient Society Public s Infrastructure Yosuke Kaga Yusuke Matsuda Kenta Takahashi, Ph.D. Akio Nagasaka, Ph.D.

More information

Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment

Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment Chih Hung Wang Computer Science and Information Engineering National Chiayi University Chiayi City 60004,

More information

Chapter 9 Key Management 9.1 Distribution of Public Keys 9.1.1 Public Announcement of Public Keys 9.1.2 Publicly Available Directory

Chapter 9 Key Management 9.1 Distribution of Public Keys 9.1.1 Public Announcement of Public Keys 9.1.2 Publicly Available Directory There are actually two distinct aspects to the use of public-key encryption in this regard: The distribution of public keys. The use of public-key encryption to distribute secret keys. 9.1 Distribution

More information

Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5

Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5 Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5 Miss. Nupoor M. Yawale 1, Prof. V. B. Gadicha 2 1 Student, M.E. Second year CSE, P R Patil COET, Amravati.INDIA.

More information

IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT

IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT IJRRECS/November 2014/Volume-2/Issue-11/3699-3703 ISSN 2321-5461 INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD

More information

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.

More information