This paper is published in Volume 3, Issue 8, 2018
Area
Information Security
Author
Manogya Pulivendala
Org/Univ
Keshav Memorial Institute of Technology, Hyderabad, Telangana, India
Pub. Date
09 August, 2018
Paper ID
V3I8-1146
Publisher
Keywords
AES, DES

Citationsacebook

IEEE
Manogya Pulivendala. Build up cloud computing security using ID based cryptographical algorithms, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARnD.com.

APA
Manogya Pulivendala (2018). Build up cloud computing security using ID based cryptographical algorithms. International Journal of Advance Research, Ideas and Innovations in Technology, 3(8) www.IJARnD.com.

MLA
Manogya Pulivendala. "Build up cloud computing security using ID based cryptographical algorithms." International Journal of Advance Research, Ideas and Innovations in Technology 3.8 (2018). www.IJARnD.com.

Abstract

So, the user uploads his confidential data over the cloud platform and definitely, he expects it to be transmitted in a secure way with no interruptions and for this to take place, the data should be transmitted through a secure channel. There are solutions to this already, for instance, Diffie Hellman Algorithm but there are problems with this too, even though it uses Discrete Logarithm method which can only decrease the chances of getting attacked. One of the main drawbacks of this algorithm is that it doesn’t establish the identity of the other party, making it susceptible to a man-in-the-middle attack (meaning the information shared between two parties is accessible to a third party). On the 9th of June, CERT-EU published an advisory concerning the Logjam attack which is a man-in-the-middle attack, again. Basically, this paper addresses the possible solution that could be provided for a much secure information exchange.
Paper PDF