Loading [MathJax]/extensions/MathZoom.js
Using location based encryption to improve the security of data access in cloud computing | IEEE Conference Publication | IEEE Xplore

Using location based encryption to improve the security of data access in cloud computing


Abstract:

Cloud computing is a new approach in the field of information technology and development of computer technologies based on the World Wide Web. One of the most important c...Show More

Abstract:

Cloud computing is a new approach in the field of information technology and development of computer technologies based on the World Wide Web. One of the most important challenges in this area is the security of cloud computing. On the other hand the security of access to critical and confidential information in banks, institutions and etc is extremely essential. Sometimes even with the enormous costs, it is not fully guaranteed and it is compromised by the attackers. In this paper by providing a novel method, we improve the security of data access in cloud computing for a company or any other specific locations using the location-based encryption.
Date of Conference: 22-25 August 2013
Date Added to IEEE Xplore: 21 October 2013
ISBN Information:
Conference Location: Mysore, India
References is not available for this document.

I. Introduction

Security has always been an integral part of human life. From ancient times to the present people have been looking for physical and financial security. With the advancement of human knowledge and getting into the new era the need of information security were added to human security concerns. Nowadays with the advancement of technology, information security and data security are needed more than any other types of the security. Some types of information and data are crucial such as companies' confidential information, banks' information, even the military intelligence and the like. On the other hand with the increasing and scattering data, users need powerful tools to process and store their data. In recent years a new technology for this purpose has been proposed which is called cloud computing. This technology enables individuals, companies and etc. To store their data and information on the cloud and they can access their own data at any time, from any place and using any computer through the internet. It is even possible to deploy a platform in a cloud and use it (instead of installing software on a personal computer). This technology is certainly a big advantage and always beside the advantages, there are disadvantages. Regarding the current structure of cloud computing, this method is considered not fully developed and gradually progresses toward evolution. The biggest challenge raised about cloud computing and many researchers are working on it, is “security”. Users (people, companies, institutions and etc.) do not know what will happen to their data and information in the cloud and whether other people can gain access to their data and so on. In This paper, first we have briefly explained cloud computing, its types and services. We have also discussed Some of security challenges faced in cloud computing. Then we have explained “location based cryptography” and “Geo-Encryption” algorithm. Finally using “Geo-Encryption” we have proposed a novel model for enhancing the security of data access control in cloud computing.

Select All
1.
Barrie Sosinsky, "Cloud Computing Bible," 1th ed, January 11, 2011.
2.
[Weiss, A. (2007) "Computing in the Clouds". Networker, Vol. 11, No. 4, pp: 16-25, December 2007
3.
David S. Linthicum, "Cloud Computing and SOA Convergence in your Enterprise", Pearson, 2010.
4.
Rajnish Choubey et al., International Journal on Computer Science and Engineering (IJCSE), 2011.
5.
R. Buyya, C. S. Yeo, and S. Venugopa, "Marketoriented Cloud Computing: Vision, hype, and reality for delivering it services as computing utilities", in Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications (HPCC-08, IEEE CS Press, Los Alamitos, CA, USA) 2008.
6.
Mehrdad Mahdavi Boroujerdi, Soheil Nazem, "Cloud Computing: Changing Cogitation about Computing", World Academy of Science, Engineering and Technology 2009.
7.
Gurudatt Kulkarni 1 et al, "Cloud Security Challenges", 7th International Conference on Telecommunication Systems, Services, and Applications (TSSA),IEEE, 2012.
8.
Cloud Hooks: "Security and Privacy Issues in Cloud Computing", Proceedings of the 44th Hawaii International Conference on System Sciences-2011.
9.
Wayne Jansen, Timothy Grance, "Guidelines on Security and Privacy in Public Cloud Computing", Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 January 2011.
10.
Ronald L. Krutz, Russell Dean, "Vines Cloud Security A Comprehensive Guide to Secure Cloud Computing", 2010.
11.
Nishanth Chandran, Vipul Goyal, Ryan Moriarty, Rafail Ostrovsky, "Advances in Cryptology", CRYPTO 2009 Lecture Notes in Computer Science Volume 5677, pp 391-407, 2009.
12.
Logan Scott E. Denning, "Location Based Encryption Role in Digital Cinema Distribution", Proceedings of ION GPS/GNSS 2003, pp 288-297.
13.
D. Qiu, "Security Analysis of Geoencryption: A Case Study using Loran", Proceeding of ION GNSS 2007.
14.
D. Qiu Lo Enge Boneh, "Geoencryption Using Loran", Proceeding of ION NTM 2007.
Contact IEEE to Subscribe

References

References is not available for this document.