Skip to main content

ASCCS: Architecture for Secure Communication Using Cloud Services

  • Conference paper
  • First Online:
Book cover Proceedings of Fifth International Conference on Soft Computing for Problem Solving

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 437))

Abstract

Security is an important aspect in an open environment. When two or more entities want to communicate, an entity must be aware about the other entity to whom he/she is communicating. Therefore there has to be a mechanism which will ensure the identities of different entities. As cryptanalysts left no stone unturned to decipher the code, therefore there has to be a mechanism to ensure that only authorized entity will be able to get the encryption−decryption code and it should be available only for limited time or on temporary basis so that no one should have time to analyze the code. As code will only be available to authorized entities, they should be able to get it on any machine. The proposed architecture will cover all the given aspects and it will provide authentication, confidentiality, availability as software as a service.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sharma, V., Gola, K.K., Khan, G., Rathore, R.: Key sharing technique to preserve integrity and confidentiality. In: Second International Conference on Advances in Computing and Communication Engineering, IEEE Computer Society (2015) doi: 10.1109/ICACCE.2015.48

  2. Kohl, J.T., Neuman, B.C.: The kerberos network authentication service, version 5 revision 5, Project Athena, Massachusetts Institute of Technology (1992)

    Google Scholar 

  3. Sudha, M., Rao, B.R.K., Monica, M.: A comprehensive approach to ensure secure data communication in cloud environment. Int. J. Comput. Appl. (0975–8887) Volume 12– No. 8, December 2010

    Google Scholar 

  4. Graham, S.L., Rivest, R.L.: Secure communications over insecure channels. Commun. ACM 21(4) (1978)

    Google Scholar 

  5. Shinde, K.M., Shahabade, R.V.: Security in WLAN using Kerberos nternational. J. Sci. Res. Publ. 4(6) (2014)

    Google Scholar 

  6. Harb, H.M., Mahdy, Y.B.: Overcoming Kerberos structural limtions, Nishidha laboratory. http://www.ii.ist.i.kyoto-u.ac.jp/~yasser/Publications/pdf OvercomingKerberosLimitationsOneColumn.pdf pp. 1–12

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vaibhav Sharma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this paper

Cite this paper

Vaibhav Sharma, Gola, K.K. (2016). ASCCS: Architecture for Secure Communication Using Cloud Services. In: Pant, M., Deep, K., Bansal, J., Nagar, A., Das, K. (eds) Proceedings of Fifth International Conference on Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing, vol 437. Springer, Singapore. https://doi.org/10.1007/978-981-10-0451-3_3

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-0451-3_3

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-0450-6

  • Online ISBN: 978-981-10-0451-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics