This paper is published in Volume 3, Issue 8, 2018
Area
Information Security
Author
Manogya Pulivendala
Org/Univ
Keshav Memorial Institute of Technology, Hyderabad, Telangana, India
Keywords
AES, DES
Citations
IEEE
Manogya Pulivendala. Build up cloud computing security using ID based cryptographical algorithms, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARnD.com.
APA
Manogya Pulivendala (2018). Build up cloud computing security using ID based cryptographical algorithms. International Journal of Advance Research, Ideas and Innovations in Technology, 3(8) www.IJARnD.com.
MLA
Manogya Pulivendala. "Build up cloud computing security using ID based cryptographical algorithms." International Journal of Advance Research, Ideas and Innovations in Technology 3.8 (2018). www.IJARnD.com.
Manogya Pulivendala. Build up cloud computing security using ID based cryptographical algorithms, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARnD.com.
APA
Manogya Pulivendala (2018). Build up cloud computing security using ID based cryptographical algorithms. International Journal of Advance Research, Ideas and Innovations in Technology, 3(8) www.IJARnD.com.
MLA
Manogya Pulivendala. "Build up cloud computing security using ID based cryptographical algorithms." International Journal of Advance Research, Ideas and Innovations in Technology 3.8 (2018). www.IJARnD.com.
Abstract
So, the user uploads his confidential data over the cloud platform and definitely, he expects it to be transmitted in a secure way with no interruptions and for this to take place, the data should be transmitted through a secure channel. There are solutions to this already, for instance, Diffie Hellman Algorithm but there are problems with this too, even though it uses Discrete Logarithm method which can only decrease the chances of getting attacked. One of the main drawbacks of this algorithm is that it doesn’t establish the identity of the other party, making it susceptible to a man-in-the-middle attack (meaning the information shared between two parties is accessible to a third party). On the 9th of June, CERT-EU published an advisory concerning the Logjam attack which is a man-in-the-middle attack, again. Basically, this paper addresses the possible solution that could be provided for a much secure information exchange.
Paper PDF
View Full Paper
Last