Cloud Computing for Secured Communication

Authors

  • Ghanshyam Shivcharan Nikhade Research Scholar, Department of Computer Science, Sardar Patel University Balaghat M.P. Author
  • Dr. Tryambak Hiwarkar Professor, Department of Computer science and engineering, Sardar Patel University Balaghat M.P. Author

DOI:

https://doi.org/10.29070/t5tdmg16

Keywords:

Cloud Computing, Cloud Infrastructure, Secured Communication, Cloud network

Abstract

Nowadays, group oriented applications such as video-conferencing, TV over internet, Video ondemand and e-learning has been developed which acquire multicast communication. Support formulticasting in apps means the data may be sent to a larger audience. The group's members must havesafe and simple means of communicating with one another. Encrypting the message before sending itout to the whole team is a must if you care about data security. A secret or group key must be sharedamongst the group members in order to encrypt and decode the material. Members of the group whohave been given the group key are the only ones who can read the encrypted material. In recent years,cloud computing has evolved as a viable platform for multicast data sharing across a community ofusers. Since a third company is responsible for protecting your data on the cloud, data security isanother major obstacle. However, a secret key must be produced and sent securely to cloud users whensharing the data with a group of people.

Downloads

Download data is not yet available.

References

Sahil Arora, Ashish Raj (2014) on “Securing the Cloud with Encryption and Key Management”, International Journal of Engineering Research & Technology (IJERT) IJERT ISSN: 2278-0181 www.ijert.org Vol. 3 Issue 7

Bibin K Onankunju (2013) on “Access Control in Cloud Computing”, International Journal of Scientific and Research Publications, Volume 3, Issue 9

Jaebok Shin, Yungu Kim, Wooram Park, Chanik Park (2013) on “A Method for Data Access Control and Key Management in Mobile Cloud Storage Services”, IEMEK Journal of Embedded Systems and Applications 8(6), DOI:10.14372/IEMEK.2013.8.6.303

Ramaswamy Chandramouli, Santosh Chokhani (2013) on “Cryptographic Key Management Issues & Challenges in Cloud Services”, Computer Security Division Information Technology Laboratory

Ivan Damgard, Thomas P. Jakobsen (2013) on “Secure Key Management in the Cloud”, 14th IMA International Conference on Cryptography and Coding

Chandran, D, Kempegowda, S 2010, ‘Hybrid E-Learning Platform Based On Cloud Architecture Model: A Proposal’, IEEE International Conference on Signal and Image Processing (ICSIP), pp. 534-537.

Chengcheng Zhang & Fei Wang 2010, ‘E-Learning Instructional Platforms Based on Network and Multimedia Technology’, Proceedings of the Second International Workshop on Education Technology and Computer Science, IEEE, Vol. 2, pp. 464-467.

Chin Bang & Yao 2010, ‘Adaptive Context Aware and Intelligent Searching in Mobile Learning Applications’, Proceedings of the Second International Conference on Computer and Automation, IEEE, Vol. 5, pp. 802-806.

Chuang, S, Chang, K & Sung, T 2011, ‘The Cost-Effective Structure For Designing Hybrid Cloud Based Enterprise E-Learning Platform’, IEEE International Conference on Cloud Computing and Intelligence Systems, pp. 523 – 525.

Constantin Musca , Ana Ion , Catalin Leordeanu & Valentin Cristea 2013, ‘Secure Access to Cloud Resources, Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, pp. 554-558.

Crago, S, Dunn, K, Eads, P, Hochstein, L, Kang, D-I & Kang, M 2011, ‘Heterogeneous cloud computing’, In: 2011 IEEE International Conference on Cluster Computing, USA, pp. 378-385.

Jinghe Huo, Shifeng Shang & Zeng Zhang 2013, ‘ACRUM: An Adaptive Cloud Resource Utilization Model’, Proceedings of the Fourth International Conference on Software Engineering and Service Science, IEEE, pp. 275-278.

Downloads

Published

2022-04-01