Author:
Solanki Madan, ,Tokekar Prof. (Dr.) Vrinda,
Abstract
Cloud applications are becoming a necessary part of modern life. Security is one of the most important non-functional requirements of every solution. Early days, security and data privacy was just luxury part of software development and it was an optional requirement but nowadays it plays a critical role in daily life. The presented work will be made to observe the need for symmetric security algorithms in Cloud application with Amazon web service. This work observes that the current security level of existing applications recommend improved security solutions to enhance the security level as well performance of proposed architecture. This work recommends Blowfish, RC6 algorithm (symmetric key cryptography) can be used to achieve confidentiality during communication Amazon web service Platform. It also considers the MD5 algorithm to maintain the integrity and modified Kerberos algorithm to achieve authentication. The complete work will propose a security architecture having solution to achieve confidentiality, integrity with strong authentication policy for Cloud application development in Amazon web service. The strong security architecture provide for data and minimum executive time in upload and download file, different key size, file size and chunking size in file. File size divided into chunk 512 bit, 1024 bit, 2048 bit after process in Amazon web service, we are found the optimum time are chunking file size 2048 bits reduce time in encryption and decryption data process and maintain strong security data file in communication including file size 5, 10, 15 and 20 Megabyte.
Publisher
Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP
Subject
Electrical and Electronic Engineering,Mechanics of Materials,Civil and Structural Engineering,General Computer Science
Reference25 articles.
1. Sakshi Narula, Arushi Jain, Prachi (2015) Cloud Computing Security: Amazon Web Service. Fifth International Conference Advanced Computing & Communication Technologies. https://doi.org/10.1109/ACCT.2015.20 [CrossRef]
2. Monika Gogna (2018) comparison of x.509, Kerberos 5 and PKINIT for open distributed network. Journal of Emerging Technologies and Innovative Research. www.jetir.org (ISSN-2349-5162)
3. P. Princy (2015) A comparision of symmetric key algorithm AES, DES, 3DES, BLOWFISH, RC4, RC6: A survey. International Journal of Computer Science & Engineering Technology 2229-3345
4. D Rachmawati et al(2017) A comparative study of Message Digest 5(MD5) and SHA256 algorithm. 2nd International Conference on Computing and Applied https://doi.org/10.1088/1742-6596/978/1/012116 [CrossRef]
5. Piyush Gupta et al (2014) A Comparative Analysis of SHA and MD5 Algorithm. International Journal of Computer Science and Information Technologies 0975-9646