Security Model for Communication and Exchanging Data in Mobile Cloud Computing
Moh`d Fawzi Al-Hunaity, Jawdat Alshaer, Osama Dorgham, Hussam Farraj "Security Model for Communication and Exchanging Data in Mobile Cloud Computing". International Journal of Computer Trends and Technology (IJCTT) V30(3):138-145, December 2015. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract -
Cloud computing technology extended data centers to the cloud; adding new possibilities for devices to access information in anytime and anywhere with reduced costs, faster deployment and maximized flexibility. Although, ensuring high levels of performance that would raise a new security challenges and concerns to be handled. However, most of the cloud computing service providers deploy security policies for data protection. But, in the client side many security approaches can be used to ensure high levels of security, which would assure security of data in the client and provider sides. In this article, security challenges are defined and security model is proposed for handling realistic security holes for cloud computing. The proposed model relies on applying high secure mechanism by using strong factor authentication and encryption process using ElGamal algorithm. Also, a new security rule is proposed by using Serpent encryption algorithm for encrypting data before being uploaded to the cloud storage. Moreover, a Secure Authentication System (SAS) was Implemented, Applying the proposed security approaches, SAS proved to provide more security compared to recently used ones.
References
[1] Chang-Lung Tsai and Uei-Chin Lin, (February 2011) Information Security of Cloud Computing for Enterprises, Volume 3, issue1.16, Number 1.
[2] Markus Johnsson & A.S.M FaruqueAzam,(March 2011) Mobile One Time Passwords and RC4 Encryption for Cloud Computing, Master Thesis,Computer and Electrical Engineering Halmstad University.
[3] Priyank Singh Hada ,Ranjita Singh ,MukulManmohan,(2011) A Mobile Agent Based Trust Model for Cloud Computing,nternational Journal of Computer Applications Volume 36 - Number 12.
[4] D.H. Patil, Rakesh R. Bhavsar, Akshay S. Thorve, ( 2012) Data Security Over Cloud ,Emerging Trends in Computer Science and Information Technology -(ETCSIT2012) Proceedings published in International Journal of Computer Applications® (IJCA)
[5] GouglidisAntonios, (2011)Towards new access control models for Cloud computing systems. University of Macedonia, Department of Applied Informatics, European Cup 2011.
[6] Announcing Request for Candidate Algorithm Nominations for the Advanced Encryption Standard (AES)", in Federal Register, Volume62, Number 177, pp 48051-48058.
[7] Sherif El-etriby, Eman M. Mohamed, Hatem S. Abdulkader, (2012) Modern Encryption Techniques for Cloud Computing, Umm Al-Qura University, and Menoufia University, Computer Science Department.
[8] Harry Katzan, Jr. (2009) Cloud Software Service: Concepts, Technology, Economics, Savannah State University, Savannah, GA 31404, Service Science 1(4).
[9] Roger Elrod, (July,2005) Two-Factor Authentication, Semester Project. East Carolina University. DTEC 6870.
[10] TaherELGamal, (Jul 1985)APublic Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms, Transaction on information theory, Page(s): 469 – 472, VOL. IT-31, NO. 4.
[11] Ron Rivest, Adi Shamir, and Leonard Adleman Certification: PKCS#1, ANSI X9.31, IEEE 1363.1977
Keywords
Cloud Computing, Cloud Security, Communication , Encryption , Data Exchange.