Design and Implementation of Strong Security Architecture for Amazon Web Service based on Cloud Applications

Author:

Solanki Madan, ,Tokekar Prof. (Dr.) Vrinda,

Abstract

Cloud applications are becoming a necessary part of modern life. Security is one of the most important non-functional requirements of every solution. Early days, security and data privacy was just luxury part of software development and it was an optional requirement but nowadays it plays a critical role in daily life. The presented work will be made to observe the need for symmetric security algorithms in Cloud application with Amazon web service. This work observes that the current security level of existing applications recommend improved security solutions to enhance the security level as well performance of proposed architecture. This work recommends Blowfish, RC6 algorithm (symmetric key cryptography) can be used to achieve confidentiality during communication Amazon web service Platform. It also considers the MD5 algorithm to maintain the integrity and modified Kerberos algorithm to achieve authentication. The complete work will propose a security architecture having solution to achieve confidentiality, integrity with strong authentication policy for Cloud application development in Amazon web service. The strong security architecture provide for data and minimum executive time in upload and download file, different key size, file size and chunking size in file. File size divided into chunk 512 bit, 1024 bit, 2048 bit after process in Amazon web service, we are found the optimum time are chunking file size 2048 bits reduce time in encryption and decryption data process and maintain strong security data file in communication including file size 5, 10, 15 and 20 Megabyte.

Publisher

Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP

Subject

Electrical and Electronic Engineering,Mechanics of Materials,Civil and Structural Engineering,General Computer Science

Reference25 articles.

1. Sakshi Narula, Arushi Jain, Prachi (2015) Cloud Computing Security: Amazon Web Service. Fifth International Conference Advanced Computing & Communication Technologies. https://doi.org/10.1109/ACCT.2015.20 [CrossRef]

2. Monika Gogna (2018) comparison of x.509, Kerberos 5 and PKINIT for open distributed network. Journal of Emerging Technologies and Innovative Research. www.jetir.org (ISSN-2349-5162)

3. P. Princy (2015) A comparision of symmetric key algorithm AES, DES, 3DES, BLOWFISH, RC4, RC6: A survey. International Journal of Computer Science & Engineering Technology 2229-3345

4. D Rachmawati et al(2017) A comparative study of Message Digest 5(MD5) and SHA256 algorithm. 2nd International Conference on Computing and Applied https://doi.org/10.1088/1742-6596/978/1/012116 [CrossRef]

5. Piyush Gupta et al (2014) A Comparative Analysis of SHA and MD5 Algorithm. International Journal of Computer Science and Information Technologies 0975-9646

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3