A Newer Secure Communication, File Encryption and User Identification based Cloud Security Architecture



Similar documents
HEAT TRANSFER ANALYSIS OF LNG TRANSFER LINE

Tank Level GPRS/GSM Wireless Monitoring System Solutions

Load Balancing Algorithm Based on QoS Awareness Applied in Wireless Networks

Before attempting to connect or operate this product, please read these instructions carefully and save this manual for future use.

IT Update - August 2006

Department of Health & Human Services (DHHS) Pub Medicare Claims Processing Centers for Medicare &

A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing security architecture

Incorporating Statistical Process Control and Statistical Quality Control Techniques into a Quality Assurance Program

THE NAVAJO NATION Department of Personnel Management JOB VACANCY ANNOUNCEMENT INFORMATION SYSTEMS TECHNICIAN

An AnyLogic Simulation Model for Power and Performance Analysis of Data Centres

ISSeG EGEE07 Poster Ideas for Edinburgh Brainstorming

Sale Mode Choice of Product Extended Warranty based on the Service Level

Overview. COSC 6397 Big Data Analytics. Fundamentals. Edgar Gabriel Spring Data Characteristics. Performance Characteristics

Grade 5 History Program

The Casino Experience

UNIVERSITÀ DEGLI STUDI DI NAPOLI FEDERICO II

Saving Through Trailer Tracking

A Systematic Approach to the Comparison of Roles in the Software Development Processes

Factors that Influence Memory

DEGRADATION MODEL OF BREAST IMAGING BY DISPERSED RADIATION

TELL YOUR STORY WITH MYNEWSDESK The world's leading all-in-one brand newsroom and multimedia PR platform

Instruction: Solving Exponential Equations without Logarithms. This lecture uses a four-step process to solve exponential equations:

A Model for Antenna-Plasma Wave Coupling towards Control of Uniformity in Slot-Excited Microwave Discharges

Problem Solving Session 1: Electric Dipoles and Torque

Reach Versus Competition in Channels with Internet and Traditional Retailers

Handout 3. Free Electron Gas in 2D and 1D

Product Overview. Version 1-12/14

Designing of Closed Loop Controller for 3 Phase to 3 Phase Power Conversion Using Matrix Converter

SYSTEMS & SERVICES VENDOR PROGRAMS SPECIALTY MARKET PROGRAMS BE A SPECIALIST OR REFER A SPECIALIST

Physics. Lesson Plan #9 Energy, Work and Simple Machines David V. Fansler Beddingfield High School

The (Bad?) Timing of Mutual Fund Investors. Oded Braverman,* Shmuel Kandel,** and Avi Wohl*** First version: February 2005 This version: August 2005

Architecture of the proposed standard

The example is taken from Sect. 1.2 of Vol. 1 of the CPN book.

A Project Management framework for Software Implementation Planning and Management

Chad Saunders 1, Richard E Scott 2

Continuity Cloud Virtual Firewall Guide

Products of the Second Pillar Pension

Our better care plan - how we ll provide the health and social care you need - now and in the future

Events and Constraints: A Graphical Editor for Capturing Logic Requirements of Programs

Parallel and Distributed Programming. Performance Metrics

Sci.Int.(Lahore),26(1), ,2014 ISSN ; CODEN: SINTE 8 131

TIME MANAGEMENT. 1 The Process for Effective Time Management 2 Barriers to Time Management 3 SMART Goals 4 The POWER Model e. Section 1.

union scholars program APPLICATION DEADLINE: FEBRUARY 28 YOU CAN CHANGE THE WORLD... AND EARN MONEY FOR COLLEGE AT THE SAME TIME!

Spring 2014 Course Guide

Maintain Your F5 Solution with Fast, Reliable Support

Improving the security of EAP-EHash authentication method

Econ 371: Answer Key for Problem Set 1 (Chapter 12-13)

High Voltage Cables. Figure Layout of three, single-core cables

Lift Selection Guide

Quality and Pricing for Outsourcing Service: Optimal Contract Design

e3 insights Stop interrupting me! Re-discovering the art of attraction through content marketing

Use a high-level conceptual data model (ER Model). Identify objects of interest (entities) and relationships between these objects

FACULTY SALARIES FALL NKU CUPA Data Compared To Published National Data

Agilent Basics of Measuring the Dielectric Properties of Materials. Application Note

Planning and Managing Copper Cable Maintenance through Cost- Benefit Modeling

off campus housing survival guide Student Services Services aux étudiants

Aegis Identity Software, Inc. Experts in Identity Management 100% Focused on Education

Moving Securely Around Space: The Case of ESA

Mechanics 1: Motion in a Central Force Field

Cisco Data Virtualization

Implied volatility formula of European Power Option Pricing

C H A P T E R 1 Writing Reports with SAS

GOAL SETTING AND PERSONAL MISSION STATEMENT

Logo Design/Development 1-on-1

Defending DoD Missions in the Commercial Cloud

A Secure Web Services for Location Based Services in Wireless Networks*

Key Management System Framework for Cloud Storage Singa Suparman, Eng Pin Kwang Temasek Polytechnic

LG has introduced the NeON 2, with newly developed Cello Technology which improves performance and reliability. Up to 320W 300W

Should I Stay or Should I Go? Migration under Uncertainty: A New Approach

Who uses our services? We have a growing customer base. with institutions all around the globe.

Real-Time Evaluation of Campaign Performance

Prepare for business. Prepare for success

5 2 index. e e. Prime numbers. Prime factors and factor trees. Powers. worked example 10. base. power

South Korean Cultural Diplomacy and Efforts to Promote the ROK s Brand Image in the United States and Around the World

IBM Healthcare Home Care Monitoring

Question 3: How do you find the relative extrema of a function?

Voice Biometrics: How does it work? Konstantin Simonchik

PHYSICS 206a HOMEWORK #11 SOLUTIONS

Data warehouse on Manpower Employment for Decision Support System

Using Open Source Tools to Support Collaboration Within CALIBRE.

Recognition of Handwritten Textual Annotations using Tesseract Open Source OCR Engine for information Just In Time (ijit)

QUANTITATIVE METHODS CLASSES WEEK SEVEN

Projections - 3D Viewing. Overview Lecture 4. Projection - 3D viewing. Projections. Projections Parallel Perspective

Rural and Remote Broadband Access: Issues and Solutions in Australia

Cornell Chronicle. Rhodes Seeks SUNY Bypass on Statutory Budgets. Cornell Film Aimed to Make Money For Africa Famine Relief

Section 7.4: Exponential Growth and Decay

Whole Systems Approach to CO 2 Capture, Transport and Storage

Superconducting gravimeter calibration by co-located gravity observations results from GWR C025

Adverse Selection and Moral Hazard in a Model With 2 States of the World

UNIVERSITY OF NAIROBI SCHOOL OF COMPUTING & INFORMATICS IMPROVING APPLICATION OF KNOWLEDGE MANAGEMENT SYSTEMS IN ORGANIZATIONS:

I N S T I T U T D E S T A T I S T I Q U E B I O S T A T I S T I Q U E E T S C I E N C E S A C T U A R I E L L E S (I S B A)

Panel Discussion: Evolving DoD Security Requirements for Cloud

Gravity and the Earth Newtonian Gravity and Earth Rotation Effects

Transcription:

A Nw cu Counication, Fil Encyption and Idntification basd Cloud cui Achitctu Tonny hkha Ka 1, M. A. Pavz Mahud 2,hahjadi Hisan Fajana 3,Kaws Wazd Nafi 1, and Bikash Chanda Kaoka 1 Dpatnt Coput cinc and Engining 1 Dpatnt Elctical and Elctonic Engining 2 Dpatnt Mchanical Engining 3 Khulna Univsi Engining and Tchnology, Khulna, Bangladsh ABTRACT Cloud coputing platfo givs popl th oppotuni fo shaing soucs, svics and infoation aong th popl th whol wold. In pivat cloud, infoation is shad aong th psons who a in that cloud. Bcaus this, diffnt scui latd pobls hav gown in this platfo. This pap wok has poposd nw scui achitctu fo cloud coputing platfo, which nsus scud counication and hiding infoation fo oths. DE basd fil ncyption and asynchonous ky fo xchanging infoation o data is includd in this odl. This stuctu is asily applicabl with ain cloud coputing fatus,.g. Paa, aa and Iaa. This odl also includs uniqu ncyption ky fo us authntication pocss. El Gaal has bn poposd in this pap fo scud counication btwn uss and cloud stoag. This pap wok ainly dals with poviding scui fo fils stod in cloud coputing achtctu. Kywods Cloud Coputing, cui achitctu, DE, El Gaal Cypto. 1. INTRODUCTION At th psnt wold ntwoking, Cloud coputing [1] is on th ost ipotant and dvloping concpt fo both th dvlops and th uss. Psons who a intlatd with th ntwoking nvionnt th psnt wold cloud coputing is a pfabl platfo fo th. Thfo in cnt days poviding scui has bco a ajo challnging issu in cloud coputing. In cloud nvionnt soucs a shad aong all th s, uss and individuals. As a sult fils o data stod in th cloud bco opn to all. Thfo, data o fils an individual can b handld by all oth uss th cloud. [2, 3] As a sult it is vy asy fo an intud to accss, isus and dstoy th oiginal fo data. An intud can also intupt th counication. Bsids, cloud svic povids povid diffnt ps applications which a vy citical natu. Fo this it is also vy uch ssntial fo th cloud to b scu [4]. Anoth pobl with cloud is that an individual ay not hav contol ov th plac wh th data hav to b stod. Bcaus a cloud us hav to us th souc allocation and schduling povidd by th cloud svic povid. Fo this it is also ncssay to potct th data o fils in th idst unscud pocsss. In od to solv this pobl w nd to apply scui in cloud coputing platfos. In ou poposd scui stuctu w hav tid to tak into account scui bachs as uch as possibl. At psnt, diffnt scui odls and algoiths a applid in th fild cloud coputing. But, ths odls hav faild to solv all scui thats. [5, 6, 7] Moov fo E-coc [8] and diffnt ps onlin businss, w nd to iply high capaci scui odls in cloud coputing filds. cui odls that a dvlopd and cuntly usd in th cloud coputing nvionnt a ainly usd fo poviding scui fo a fil and not fo th whol counication [9]. Moov psnt scui odls a sotis using scud channl fo counication [10]. But, this is not cost ffctiv pocss. Again, it is a to find a cobind wok ain scui, tansaction btwn th and so on. o odls though to discuss about all ths, thy a fully dpndnt on us appoach and faild to us achin intllignc fo gnating ky and nw poposd odl. o odls hav poposd about hadwi ncyption fo scud counication [11]. It is asy to thinking, but had to iplnt. Bsids, hadwi ncyption is hlpful only fo databas, not fo oth scui issus. Again, authnticatd us dtction is now a day vy ipotant thing, which is aly discussd in th cntly usd odls fo nsuing scui in cloud coputing. In this pap w a going to show a nw scui achitctu fo cloud coputing platfo. H fils a ncyptd with DE algoith in which kys a gnatd andoly by th. Fo on fil, only on ky is gnatd. Two s, ans distibutd concpts a usd h fo nsuing high scui. This odl also hlps to solv ain scui issus lik alicious intuds, hacking, tc cloud coputing platfo. El Gaal algoith is usd fo scud counication btwn th uss and th copanis s. Th pap is oganizd in following way :- sction 2 dscibs th latd cloud coputing scui achitctus and odls; sction 3 dscibs bifly th poposd cloud coputing stoag achitctu; sction 4 dscibs th stpby-stp xcution pocss poposd achitctu; sction 5 discusss on th sults th poposd odl got fo diffnt xpints with uss in lab and finally, sction 6 discusss on ou achivnts and futu plans. 2. RELATED WORK Vaious sachs on scui in cloud coputing hav alady copltd now a day. Idntification basd cloud coputing scui odl was wokd out by diffnt sachs [12]. But only idntify th actual us dos not all tis giv lif fo data hacking o intuding data o infoation savd in th databas cloud nvionnt. Yao s Gabld Cicuit is usd fo scu data saving in cloud 26

s [13, 14]. But it is also an idntification basd wok. It dos not wok with nsuing scui in whol cloud coputing platfo. Rsachs latd with nsuing scui in whol cloud coputing nvionnt hav alady wokd out in diffnt stuctus and shapd. AE basd fil ncyption is usd in so ths wokd out odls [15, 16]. DE basd fil ncyption is also sachd out [17]. But ths odls kp both th ncyption ky and ncyptd fil in on databas. o, only tid and bco succssful to hack on th s can giv th hack all infoation about th fil, which is not dsiabl. o oth odls and scud achitctu a poposd fo nsuing scui in cloud coputing nvionnt [18, 19]. Though ths odl nsus scud counication btwn uss and s, but ths odls dosn t ncypt th loadd infoation. But fo bst scui nsuing pocss th uploadd infoation nds to b ncyptd so that non can know th infoation. o oth pcious scud odls fo cloud coputing nvionnt a also sachd out [20, 21]. But, ths odls also fails to nsu all citia cloud coputing scui issus [22]. 3. PROPOED MODEL Th Poposd Modl ainly woks with th following scui algoiths: 1. El Gaal [23, 24, 25] 2. DE Encyption algoith [26] Duing th ti woking with poposd odl, w dvlopd and wokd with th cloud-coputing scnaio shown in Figu 1. (Main contol BAE BAE BAE Fig 1: Cloud Achitctu (Woking cnaio) In this scnaio, w can s that all th uss nd to contact with th ain and with th hlp this coput uss can counicat with databass fo uploading o downloading thi fils. Evy ti th svs th uss. It taks fils fo th uss, kps ths fils in diffnt databass, which a connctd with it and tiv fils fo th databass to spcific uss whnv ndd. As th is no oth connction btwn th and th databass, ths connctions a not scud. No scui algoith is applid h. Btwn uss and th, El Gaal cypto is usd. Public and pivat kys btwn th uss and th ay b distibutd with th hlp KDC o a thid pa coput/, which ay b installd by th cloud. H, at th ti uploading a fil, th fil is ncyptd with th public ky th cloud, ainly with th public ky th. At th ti downloading a fil, a us fist snds his/h qust his/h fil, which h/sh has alady uploadd bfo, in an ncyptd foat. Th dcypts it and pocsss th qust. thn ncypts th qustd fil, which is tiv th databas, with th public ky th us (sachd out o qust KDC fo th public ky th us) and snds it to that us. Fo this ason, only th spcific us can dcypt th fil and wok with it. Again, El Gaal is pobabilistic. On fil can b ncyptd is sval ways. o, it bcos had fo on to undstand th kys. Fo this ason, no on can asily intupt in th counication btwn th uss and cloud stoag. Whn a us uploads his/h fil to cloud stoag, th fist ncypts it with th hlp DE algoith. DE algoith uss 64-bit long ky fo ncyption pocss and 16 cycls, which includs substitution and tansaction. This aks th fil unadabl to th outsids. This ncyption ky is gnatd by th. Whn a us uploads his/h fil to cloud, th fist gnats andoly a 64-bit ky and ncypt th fil. Thn, th snds th ky to th us s ail addss, who has uploadd th fil. Thn, th andoly slcts on databas, attachd with th and uploads th fil to that slctd databas. Th aintains a tabl wh it ntis th no accopanying with us na and fil na. Bcaus ail no us is usd by th poposd cloud stoag as us na, it is uniqu and both fil na and us na can giv a uniqu psntation an uploadd fil. o, it bcos asy fo th to upload fil to a databas and tiv th fil asily whnv ndd. If a databas is busy in uploading fil whn th wants to upload anoth fil in that databas, th again andoly slcts anoth databas xcpt th pvious on and uploads th fil. If th tis to upload a fil to th databas, which is lag than th f siz that databas, th again slcts andoly anoth databas xcpt th psnt on and uploads th fil. Th 64-bit fil ncyption ky is also hlpful fo authnticat th us. Bcaus this ncyption ky is snt to uss ail accounts, only authnticat uss can opn thi uploadd fils. At th ti downloading that fil, th asks th ncyption ky to th us. Fo this ason, no oth pson xcpt th actual on can opn and accss th fils. Again, if anyon wants to hack fils fo th counication channls btwn th and databas s, no on can do it asily bcaus vything opation is don though th. Accidntly, if anyon gts a fil, it will bco uslss to hi. Bcaus only ncyptd fils a snds fo to databas s and no copy ky is kpt in oy. This poposd cloud scui odl woks with not only fil ncyption basd scui odl but also with authntication basd scui odl. o, th poposd cloud scui odl achitctus looks lik as shown in Figu 2 s El GAMAL (Main DE Fig 2: Poposd Cloud cui Achitctu BAE 4. EXPERIMENTAL ETUP Th odl shown in figu 2 has wokd out in th lab with th following configuation:- 1. Pocsso Co 2 duo 2.6 GHz 2. RAM 2 GB 3. Windows 7 4. Cobination AP.Nt and C# 27

At fist public and pivat kys with th hlp EL Gaal a gnatd with a coput. Thn, thy a distibutd to th uss and ain. s us th public ky th cloud stoag fo ncypting th fil ady uploading by th uss. Cloud stoag uss public ky th spcific uss fo ncypting th tivd fils and snds th to uss. Figu: 3 shows stp by stp pocss scud tansactions btwn a us and th :- b) a) c) d) K _ () U + {U _ (M)} K + {K _ ()} U _ (M) yst v yst v yst v yst v Fig 3: tp by tp El Gaal Tansactions H, fo Figu 3 w s that, at fist, ssag is ncyptd by ky k -, which is th public ky th cloud stoag. This public ky is gnatd by El Gaal cypto pocss [27]. Aft civing th fils, dcypts it with pivat ky K +. at that ti th ssag o fil is accssibl by th. Fo snding sothing to uss, ncypts th fils o ssag with public ky that us, U -. Aft gtting ths fils, uss opn it with thi own pivat ky, U +. Thn it bcos adabl and accssibl to uss. Aft gtting th fils fo th uss, th ain stats its woks. Fist all it andoly gnats a 64 bit ky. Aft that, th ncypts th fils and snds th ncyption kys to spcific uss ail addsss. Fils a thn uploadd by th to databas s (On fil in on databas ). Whn uss want to download fils, only with th hlp ncyption kys, th fils can b opnd and adabl by th uss. Figu 4 shows th whol fil ncyption pocsss pictoially. Fo Figu 4 w s that at fist all tansactions, uss fist upload fils. Each us can upload on fil at a ti. thn gnats ncyption kys (K), ncypts fil, insts fil, databas infoation in tabl, and snds th kys to spcific uss. Nxt ti, whn us wants to download a fil, h nds to snd his ncyption ky (K) to th ain. than tivs that fil fo databas by saching out spcific databas accoding to th infoation in (sa as Tabl 1). a) d) b) c) Fig 4: tp by tp Fils Encyption pocss Aft th copltion th download pocss, th fils a no o in databas and kys bco uslss. If on wants to upload th sa fil again, a nw ky will b snt by th to his/h ail account. Tabl 1. Tabl Maintaind in v fo s, Fils and Databas vs Infoation Account Fil Na v Nub abc@yahoo.co Abcd.txt 1 bddf@gail.co Asdfasd.dat 2. asdfa@hotail.co Ppoip.xtnsion 1 5. EXPERIMENTAL REULT Expintal sults th poposd odl a takn in two phass. H ti d fo th copltion ach phas is takn und considation. Th full xpintal wok has takn 40 popl viws fo gtting sults th poposd odl. Phas 1: 40 popl hav wokd with th El Gaal ncyption and dcyption tchniqu fo counicating with th ain ( ) th cloud stoag. s d fo snding qust and fils fo uss sid to and aft pocssing downloading qust, tis d fo snding fils fo to uss sid a shown in Tabl 2. Though th xpint is copltd with 40 popl, 10 popl s sults a shown h. Tabl 2. Rsulting fo Tansactions btwn s and Cloud toag v Nu b Popl us sid to Upload fils (M) nd ky, K Rq fil and snd Ky, K nd Fils to that us v (ain Rand gn. Ky and Encypt v (ain Dcypt with that ky Nub Popl Fils DE ncyptd Ask fo fils Rtiv fils us sid to [M] [M] d fo to that us 1 2 sc 2 sc 6 3 sc 3 sc 2 3 sc 3 sc 7 2 sc 2 sc 3 2 sc 3 sc 8 2 sc 2 sc 4 2 sc 2 sc 9 3 sc 2 sc 5 3 sc 3 sc 10 2 sc 2 sc 28

Fo th data Tabl 2 w can s that tansactions fo uss sid to o fo sid to uss tak avagly 2-3 sconds. Th ang fils siz, which a usd by th uss to counicat with th poposd odl a laid btwn 5 KB to 50 KB. Phas 2: 40 popl hav wokd with DE fil ncyption and dcyption tchniqu fo uploading fils fo to databas (th fil stoag dvic). s d fo uploading fils fo to databas s and fo pocssing downloading qust, aft saching out fils, tis d fo tansfing sachd fils fo stoag dvics to a shown in Tabl 3. Again, 10 popl s sults a shown h. Tabl 3. Rsulting fo Tansactions btwn v and Fil toag vs Nu b Popl d fo to databas databa s to Nu b Pop l d fo to databas databa s to 1 1 sc 2 sc 6 1 sc 2 sc 2 1.5 sc 2.5 sc 7 1 sc 2 sc 3 1 sc 2 sc 8 1.5 sc 2.5 sc 4 1 sc 1.5 sc 9 1 sc 2 sc 5 1.5 sc 3 sc 10 1 sc 2 sc Fo Tabl 3 w can s that tansactions fo DE ncyption pocss tak avagly 1-2 sc. Th poposd cloud stoag scui achitctu has solvd diffnt scui pobls fo cloud coputing platfo. It solvs us authntication pobl, any us intuption pobls, fil hacking pobls, tc. Th advantags th poposd odl on diffnt points a discussd in Tabl 4. Points fo discussio n Ways nsuing scui Infoati on lakag pobabili Coplxi Ensuing Tabl 4. Advantags th Poposd Modl Ov Diffnt Psnt Modls Idntific ation Basd Modls Only idntify th authoiz d pson, Fil ncyption basd Modls Ky and fil both ains in on. o, gtting accss on on hlps to gt all infoatio n cud channl using odls Intud cant accss th data, but upload d fil is not scud Poposd Modl Both idntify popl and Encypt Fils fo ak scu fo intuds Mdiu Mdiu Mdiu Low Low Mdiu Low Low Main th If ky is chosn by Pobably not On ncyption Authnti cation Excutio n ti cui Baking pobabili Cloud Achitct u cui Lvl us, thn slightly authnticat uss aintain d ky fo on fil. o, ach us has uniqu ncyption ky, which authnticat s hi/h all Mdiu all all Mdiu Mdiu Mdiu Pobably Low than oths Mdiu Mdiu Mdiu High than oth odls 6. Conclusion In this pap w hav poposd a nw scui stuctu fo cloud coputing nvionnt which includs DE fil ncyption and EL Gaal cypto fo scu counication This odl nsus scui fo uploadd fils in cloud, authnticat uss. H, xcution ti is low bcaus lightwight scui nsuing algoiths. H, us authntication with th hlp uniqu ncyption ky hlps to nsu pop us intaction. Again, ach algoith is xcutd individually in ach singl and th sults ths algoiths a thn tansitt on sid to oth. Fo this ason dcision taking is asy h fo ach, lik authnticat us, giv accss on fil, tc. In poposd odl El Gaal cypto is usd which is pobabilistic. In futu w want to wok with nsuing high scu counication btwn uss and with hlp oth scui algoiths, us to us. W also want to wok with diffnt ncyption algoiths to find out o scu ncyption fo solving pobls latd with DE fil ncyption. 7. ACKNOWLEDGMENT Th Authos a willing to xpss thi pound gatitud and hatist thanks to all th sachs in th fild cloud coputing achitctu s scui, spcially to th dvlops DE and El Gaal data scui algoiths, who hav ad thi sach wok asy to accoplish. 8. REFERENCE [1]. Yashpal Kada, cui Issus in Cloud Coputing A Tanspant Viw, Intnational Jounal Coput cinc Eging Tchnology, Vol-2 No 5 Octob, 2011, 316-322 [2]. Rohit Bhadauia, Ritupana Chaki, Nabndu Chaki, ugata anyal, A uvy on cui Issus in Cloud Coputing, 2011 [3]. Mladn A. Vouk, Cloud Coputing Issus, Rsach and Iplntations, Jounal Coputing and Infoation Tchnology - CIT 16, 2008, 4, 235 246 29

[4]. Y Hu, Johnny Wong, Gabil Iszlai, Main Litoiu, Rsouc Povisioning fo Cloud Coputing, IBM Canada Ltd., 2009 [5]. Danil Cattddu, Gils Hogbn, Cloud Coputing:- Bnfits, isks and condations fo infoation scui, Novb, 2009 [6]. Cloud Coputing: ilv Lining o to Ahad?, Volu 13 Nub 2, ping 2010 [7]. NGONGANG GUY MOLLET, CLOUD COMPUTING ECURITY, Thsis Pap, Apil 11, 2011 [8]. Gunaska Kua, Aniudh Chlikani, Analysis scui issus in cloud basd -laning, Mast s thsis, 2011 [9]. Jiyi Wu, Qianli hn, Tong Wang, Ji Zhu, Jianlin Zhang Rcnt Advancs in Cloud cui, JOURNAL OF COMPUTER, VOL. 6, NO. 10, OCTOBER 2011 [10]. Ahad-Rza adghi, Thoas chnid, and Macl Winandy, Tokn - Basd Cloud Coputing cu Outsoucing Data and Abitay Coputations with Low Latncy, TRUT 2010, LNC6101, pp. 417 429, 2010. [11]. Tustd Coputing Goup, olving th Data cui Dila with lf-encypting Divs, May 2010 [12]. Hongwi Li, Yuanshun Dai, Ling Tian and Haoiao Yang, Idnti-Basd Authntication fo Cloud Coputing, Cloud Co 2009, LNC 5931, pp. 157 166, 2009 [13]. vn Bugil, tfan Nunbg, Ahad-Rza adghi, Thoas chnid, Twin Clouds: cu Cloud Coputing with Low Latncy, CAED, Gany, 2011 [14]. vn Bugil, tfan Nunbg, Ahad-Rza adghi, Thoas chnid, Twin Clouds: cu Cloud Coputing with Low Latncy - Extndd Abstact, CAED, Gany, 2011 [15]. Luis M. Vaquo, Luis Rodo-Mino, Danil Moán, Locking th sky: a suvy on Iaa cloud scui, Coputing (2011) 91:93 118 [16]. Yang Tang, Patick P. C. L, John C.. Lui, and Radia Plan, FADE: cu Ovlay Cloud toag with Fil Assud Dltion, 2010 [17]. Nha Jain and Gupt Kau, Iplnting DE Algoith in Cloud fo Data cui, VRD-IJCIT, Vol. 2 (4), 2012, pg: 316-321 [18]. Thuy D. Nguyn, Mak A. Gond, David J. hiffltt, Jan Khosali, Tiothy E. Lvin, Cynthia E. Ivin, A Cloud-Ointd Coss-Doain cui Achitctu, Th 2010 Militay Counications Confnc, U.. Govt. [19]. Cong Wang, Qian Wang, and Kui Rn, Wnjing Lou, Ensuing Data toag cui in Cloud Coputing, U National cinc Foundation und gant CN- 0831963, CN-0626601, CN-0716306, and CN- 0831628, 2009 [20]. Vaibhav Khadilka, Anuj Gupta, Muat Kantacioglu, Latifu Khan, Bhavani Thuaisingha, cu Data toag and Rtival in th Cloud, Univsi Txas, 2011 [21]. John Haauz, Loi M. Kaufan, Buc Pott, data cui in th Wold Cloud Coputing, Th IEEE Coput OCIETIE, August, 2009 [22]. Kvin Haln, Muat Kantacioglu, Latifu Khan, Bhavani Thuaisingha, cui Issus fo cloud coputing, Intnational Jounal Infoation cui and Pivacy, 4(2), 39-51, Apil-Jun 2010 [23]. Tah ElGaal, A public ky cypto and a signatu sch basd disct logaiths, HP labs, 1985. [24]. AndasV.Mi, Th ElGaal Cypto, 2005. [25]. Mlissa Hlgson, cui and Applications ElGaal s Encyption Algoith, Googl chola, [26]. Rayond G. Ka, Willia M. Daly, ENCRYPTION TANDARD (DE), FEDERAL INFORMATION PROCEING TANDARD PUBLICATION, FIP PUB 46-3, 1999 [27]. Maco Bodato, Public ky cyptogaphy. ElGaal, hints on iplntation, Tokyo Univsi cinc - Mach 18 th, 2008 30