International Journal of Information Engineering and Electronic Business(IJIEEB)

ISSN: 2074-9023 (Print), ISSN: 2074-9031 (Online)

Published By: MECS Press

IJIEEB Vol.8, No.3, May. 2016

Two Level Hybrid SECO Environment for Secure Cloud Environment

Full Text (PDF, 862KB), PP.31-40

Views:109   Downloads:7


Manpreet kaur, Hardeep Singh

Index Terms

Cloud computing;content security;AES algoritm;Diffie-hellman algorithm; Digital Signature;Window Azure


As cloud computing becomes prevalent, sensitive information are being increasingly centralized into the cloud. Number of users used cloud to store their data. In general terms means encrypted form hackers can easily hack or modify the data because there is no security while uploading the data to cloud server. Due to this problem cloud server can easily deployed. As security is one of the major concerns in cloud environment for preventing data deployment during upload. The best solution for the protection of data privacy is done by encryption the sensitive data before being outsourced to cloud server, which makes effective data utilization a very challenging task. There are a number of security and privacy concerns associated with cloud computing but these issues fall into two broad categories: security and privacy concerns faced by cloud providers and security and privacy concerns faced by their customers. Different set of algorithms have been implemented on cloud environment for enhancing the security but still there are some major concerns like malicious attacks. In previous work on AES based encryption and a SECO based environment were introduced.. In SECO based environment root package generated key by using diffie-hellman algorithm and domain package generated key by using private key of root package. In AES algorithm and SECO based environment individually provided some sort of level encryption. In this both algorithms work on single level encryption approach which may be easily broken by malicious users. So, in proposed work both techniques that is AES and SECO based environment will be combined to provide two level security and also will double the encrypted environment which may not be easily broken by malicious users. Result will be more efficient and secure than the previous work. 

Cite This Paper

Manpreet kaur, Hardeep Singh,"Two Level Hybrid SECO Environment for Secure Cloud Environment", International Journal of Information Engineering and Electronic Business(IJIEEB), Vol.8, No.3, pp.31-40, 2016. DOI: 10.5815/ijieeb.2016.03.04


[1]Balachandra Reddy Kandukuri, Rama Krishna Paturi and Dr. AtanuRakshit, "Cloud security issues" In Services Computing, 2009. IEEE International Conference on, page 517520, 2009.

[2]Bellare, Mihir, Alexandra Boldyreva, and Adam O'Neill. "Deterministic and efficiently searchable encryption." Advances in Cryptology-CRYPTO 2007. Springer Berlin Heidelberg, 2007. 535-552.

[3]Chuah, M., and W. Hu. "Privacy-aware bedtree based solution for fuzzy multi-keyword search over encrypted data." Distributed Computing Systems Workshops (ICDCSW), 2011 31st International Conference on. IEEE, 2011.

[4]C. Dourolis, P. Ramanathan and D. Moore, "what do packet dispersion techniques measures/", In Proc. IEEE INFOCOM, Anchorage, AK pp. 905-914[2001].

[5]Cheng, K.M., chang. T.Y., and Lo J.W., 2010."Cryptanalysis of security enhancement for a Msodified Authenticated Key Agreement Protocol "international Journal of network security, vol. 11, No.1, pp. 55-57.

[6]Cong Wang, Qian Wang, KuiRen and Wenjing Lou, "Ensuring Data Storage Security in Cloud Computing", In Quality of Service, 2009. 17th International Workshop on, page 19, 2009.

[7]D. Brewer and M.Nash "The chinese wall security policy", In proc. Of the symp.on security and privacy, Dakland, CA pp. 215-228. IEEE Press, [1989]

[8]Dr.R.Manicka Chezian and C.bagyalakshmi "a survey on cloud data security Using encryption technique" in International journal of advanced research in computer engineering & technology , Volume 1, Issue 5, July 2012.

[9]Dong Xin, et al. "achieving secure and efficient data collaboration in cloud computing." Quality of service, 2013 IEEE/ACM 21st International symposium on.IEEE, 2013.

[10]Er. Rimmy Chuchra, Lovely Professional University, Phagwara, India, "Data Security in Cloud Computing", International Journal Nov., 2012.

[11]Foster, I. T., Zhao, Y., Raicu, I., & Lu, S. (2009). Cloud Computing and Grid Computing 360-Degree Compared CoRR. abs/0901.0131.

[12]Hassan Takabi, James B. D. Joshi and Gail-JoonAhn, "Secure Cloud: Towards a Comprehensive Security Framework for Cloud Computing Environments" Proceedings of the 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops, p.393-398, July 19-23, 2010.

[13]Hamlen, K. Kantarcioglu, M., Khan, L., and Thuraisingham, B., " Security issues for cloud computing, "International journal of information security & privacy (IJISP), Vol.4, No.2 pp.36-48

[14] algorithm. php, Diffie Hellman algorithm Rilly Lochridge Algorithm, 2003

[15]J. Brodkin. Gartner: "Seven cloud-computing security risks", Infoworld, 2008.

[16]Jianyong Chen, Yang Wang, and Xiaomin Wang, "On demand security Architecture for cloud computing", 0018- 9162/12, published by the IEEE Computer society in 2012.

[17]Jintao Liu, School of Electronics and Computer Science University of Southampton, "Cloud Computing Security", 2009.

[18]John Harauz, Lori M. Kaufman and Bruce Potter, "Data security in the world of cloud computing" published by the IEEE computer and reliability societies in July/August 2009.

[19]Jain, Neha, and Gurpreet Kaur. "Implementing DES Algorithm in cloud for data security." VSRD International Journal of Computer Science & Information Technology 2.4 (2012): 316-321.

[20]JainA, Palak, et al. "An Approach for a Password Encryption Using Dual Server."

[21]Malik, Rameshwari, and Pramod Kumar. "Cloud Computing Security Improvement using Diffie Hellman and AES." International Journal of Computer Applications 118.1 (2015).

[22]Meiko Jensen, JlorgSchwenk, Nils Gruschka and Luigi Lo Iacono, "On Technical Security Issues In Cloud Computing", IEEE International Conference on Cloud Computing, 2009.

[23]M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, Above the Clouds : A Berkeley View of Cloud Computing, 2009.

[24]Nabendu Chaki, "A Survey on Security issue in Cloud Computing" in 6th International conference on Electrical Engineering/Electronics, Computer, Telecommunication and Information Technology, May 2009.

[25]Neela, K., "A survey on security Issues and vulnerabilities on cloud computing", vol.2, No.7, pp.855-860 

[26]Nils Gruschka and Meiko Jensen, "Attack surface: A taxonomy for attacks on cloud services" in 2010 IEEE 3rd international conference on cloud computing.

[27]Pahal, Ritu, and Vikas Kumar. "Efficient Implementation of AES." International Journal of Advanced Research in Computer Science and Software Engineering Volume 3 (2013).

[28]Song DX., Wagner D., Perrig A. (2000), "Practical techniques for searches on encrypted data" , Proceedings of IEEE Symposium on Security and Privacy, IEEE, Berkeley, California, pp 44–55.

[29]Vamsee Krishna and Sriram Ramanujam," Data Security in Cloud Computing", Journal of Computer and Mathematical Sciences, vol. 2, Issue 1, 28 February, 2011.

[30]Will Gorner, "Diffie Hellman Key Exchange" ppts.

[31]Xia Z., Zhu Y., Sun X. and Chen L. (2014), "Secure semantic expansion based search over encrypted cloud data supporting similarity ranking "Journal of Cloud Computing", Springer 3.1, pp. 1-11.