Performance Evaluations for Orthogonal Handshaking Authentication Mechanism (OHASM) in Secure Cloud Storage
DOI:
https://doi.org/10.51983/ajsat-2018.7.2.1036Keywords:
Secure, Storage, Data, Orthogonal and AuthenticationAbstract
In general, the cloud computing contributes its wide services in effective resource utilization among vendors. To share the resources such as Infrastructure as a Service (IaaS), Software as a Service (SaaS) and Platform as a Service (PaaS) in a secure channel is carried out by using different cryptographic algorithms. The demand created by IT industry provides a road map in a potential way for sharing cloud storage with variety of secure mechanism. Secure storage or security in cloud storage characterizes the convergence of the approaches in four categories: method of storage, crypto graphic algorithms, key distribution and authentication. When considering privacy risks in the cloud, as considered already within the introduction, context is very important as privacy threats differ according to the type of cloud scenario. The concepts related with secure cloud data transaction is make use of different emerging trends in real time applications such as financial transactions, medical records maintenances in health care sectors like wise. The largest part of healthcare entities is required to establish strong cloud service applications with elaborated provisions relating to security and privacy in order to fully understand their liabilities and risks as well as being able to absorb those risks in the event of non-compliance. In this research work focus a way to secure cloud data storage in transaction aspect with healthcare domain. Each and every cloud security mechanism with healthcare record maintenances is using a variety of cryptographic algorithms. Almost it describes the encrypted documents are reside in a single cloud server along with its encrypted key. This work propose a method of such secure mechanism by using Orthogonal Handshaking Authentication Mechanism (OHSAM) with a working principle of separate storage for encrypted content and its key in a cloud server.
References
K. Subramanian and M. Mohamed Sirajudeen, "An Architectural Framework for Secure Cloud data Storage Management by using Orthogonal Handshaking Authentication Mechanism (OHSAM)," International Journal of Mechanical Engineering and Technology, vol. 9, no. 3, pp. 791–799, 2018.
K. Subramanian and M. Mohamed Sirajudeen, "Implementation of Secure Cloud data Storage- Data Transaction by using an Orthogonal Handshaking Authentication Mechanism(OHSAM)," International Journal of Computer Science and Information Technology (IJCSIS), vol. 16, no. 3, pp. 221-227, March 2018.
B. Veerendra and Y. V. Durga Prasad, "A Trusted Framework for Authentication and Security for Business Applications in Cloud," International Journal of Modern Trends in Science and Technology, vol. 3, special issues no. 1, pp. 32-35, February 2017.
Manish, RadhaiMahavidyalaya, R. Shinde, and Rahul D. Taur, "Encryption Algorithm for Data Security and Privacy in Cloud Storage," American Journal of Computer Science and Engineering Survey, ISSN: 2349-7238.
Eng. Hashem H. Ramadan and Mousse Adamou Djamilou, "Using Cryptography Algorithms to Secure Cloud Computing Data and Services," American Journal of Engineering Research (AJER), vol. 6, no. 10, pp. 334-337, 2017.
T. Ramaporkalai, "Security Algorithms in Cloud Computing," International Journal of Computer Science Trends and Technology (IJCST), vol. 5, no. 2, pp. 500-503, Mar – Apr. 2017.
PapriGhosh, Vishal Thakor, and Dr. PravinBhathawala, "Data Security and Privacy in Cloud Computing Using Different Encryption Algorithms," International Journal of Advanced Research in Computer Science and Software Engineering, ISSN: 2277 128X, vol. 7, no. 5, pp. 469-471, May 2017.
K. V. Nasarul Islam and K. V. Mohamed Riyas, "Analysis of Various Encryption Algorithms in Cloud Computing," International Journal of Computer Science and Mobile Computing (IJCSMC), vol. 6, issue 7, pp. 90 – 97, July 2017.
M. Omer Mushtaq, FurrakhShahzad, M. Owais Tariq, MahinaRiaz, and BushraMajeed, "An Efficient Framework for Information Security in Cloud Computing Using Auditing Algorithm Shell (AAS)," International Journal of Computer Science and Information Security(IJCSIS), vol. 16, no. 11-2016, pp. 317-331.
JasleenKaur and Dr. SushilGarg, "Security in Cloud Computing using Hybrid of Algorithms," International Journal of Engineering Research and General Science, vol. 3, issue 5, pp. 300-305, September-October 2015.
Er. AshimaPansotra and Er. SimarPreetSingh, "Cloud Security Algorithms," International Journal of Security and Its Applications, vol. 9, no. 10, pp. 353-360, 2015.
M. Mohammed Sirajudeen and K. Subramanian, "Enhancement of the Private Cloud Data Transaction by using an Orthogonal Handshaking Authentication Protocol (OHSAP)," International Journal of Computer Applications, vol. 96, no. 23, 2014.
Jean Raphael NgnieSighom, Pin Zhang, and Lin You, "Security Enhancement for Data Migration in the Cloud," Future Internet, vol. 9, no. 23; DOI: 10.3390/fi90300232017.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2018 The Research Publication
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.