Browse > Article
http://dx.doi.org/10.15207/JKCS.2019.10.12.023

User Signature Protection Model for Different Cloud Areas  

Jeong, Yoon-Su (Department of information Communication Convergence Engineering, Mokwon University)
Kim, Yong-Tae (Department of multimedia, Hannam University)
Park, Gil-Cheol (Department of multimedia, Hannam University)
Publication Information
Journal of the Korea Convergence Society / v.10, no.12, 2019 , pp. 23-28 More about this Journal
Abstract
Cloud services are services developed to serve a wider variety of users in different fields. However, although cloud services are designed to reflect the needs of different users, a variety of security damages resulting from them are increasing and technologies are needed to address them. This paper proposes a user signature management model that prevents third parties from exploiting the user's signature in a heterogeneous cloud The proposed model strengthens the functionality of the intermediate devices that make up the hierarchical cloud while also managing the signature information of the partitioned user. As a result of the performance assessment, the proposed model not only distributed user signature management, but also improved efficiency by 8.5% on average because intermediate devices distributed user signature processing, and reduced the user's signature latency by 13.3% on average when performing user authentication processing. On average, the overhead generated by intermediate devices processing a user's signature was 10.1 percent lower than that of conventional techniques.
Keywords
Cloud; Security; User Signature; Authentication; Encryption.Decryption;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 H. Abwnawar & R. S. Janicke. (2017, July). Towards location-aware access control and data privacy in inter-cloud communications. IEEE EUROCON 2017-17th International Conference on Smart Technologies (pp. 739-744). Macedonia : IEEE DOI : 10.1109/EUROCON.2017.8011209
2 J. J. Yang, J. Q. Li & Y. Niu. (2015). A hybrid solution for privacy preserving medical data sharing in the cloud environment. Future Generation Computer Systems. 43(44), 74-86. DOI : 10.1016/j.future.2014.06.004
3 D. P. Gayathri. (2013). Overview of RSA and its enhancements. International Journal of Innovative Research and Development, 2(11), 306-310.
4 S. Nagaraj, Dr. G. S. V. P. Raju & V. Srinadth. (2015). Data Encryption and Authentication Using Public Key Approach. Elsevier Procedia Computer Science. 48, 126-132. DOI : 10.1016/j.procs.2015.04.161   DOI
5 A. K. Dubey, A. K. Dubey, M. Namdev & S. S. Shrivastava. (2016, November). Cloud-User Security Based on RSA and MD5 Algorithm for Resource Attestation and Sharing in Java Environment. IEEE (pp. 1-8). Indore : IEEE. DOI : 10.1109/CONSEG.2012.6349503
6 P. Yellapa, C. Narasimham & V. Sreenivas. (2013). Data Security in Cloud using RSA. IEEE. p. 1-6. DOI : 10.1109/ICCCNT.2013.6726471
7 V. V. S. Mahalle & A. K. Shahade. (2016). Enhancing the data security in Cloud by implementing Hybrid (Rsa & Aes) Encryption Algorithm. IEEE. 146-149. DOI : 10.1109/INPAC.2014.6981152
8 A. Kahate. (2010). Cryptography and Network Security. Tata McGraw Hill Education Private Ltd., New Delhi.
9 N. Khanezaei & Z. M. Hanapi. (2016). A framework based on RSA and AES encryption algorithms for cloud computing services. IEEE. 58-62. DOI : 10.1109/SPC.2014.7086230
10 A. Priya, Y. K. Rana & B. P. Patel. (2015). Design and Implementation of an Algorithm to Enhance Cloud Security. International Journal of Computer Applications. 113(12), 41-46. DOI : 10.5120/19882-1896   DOI
11 G. L. Prakash, Dr. M. Prateek & Dr. I. Singh. (2014). Data Encryption and Decryption Algorithms using Key Rotations for Data Security in Cloud System. International Journal Of Engineering And Computer Science. 3(4), 5216-5223. DOI : 10.1109/ICSPCT.2014.6884895
12 S. Verma & D. Garg. (2015). Improvement in Rebalanced CRT RSA. The International Arab Journal of Information Technology. 12(6), 524-531.
13 Y. S. Jeong, Y. T. Kim & G. C. Park. (2017). A hierarchical property-based multi-level approach method for improves user access control in a cloud environment. Journal of the Korea Convergence Society. 8(11), 7-13.   DOI
14 Y. S. Jeong & Y. H. Yon. (2018). User privacy protection model through enhancing the administrator role in the cloud environment. Journal of Convergence for Information Technology. 8(3), 79-84   DOI
15 Y. S. Jeong. (2018). User Privacy Security Scheme using Double Replication Key in the Cloud Environment. Journal of the Korea Convergence Society. 9(4), 9-14.   DOI