To Enhance the OTP Generation Process for Cloud Data Security using Diffie-Hellman and HMAC

α
Gagandeep Kaur Sandhu
Gagandeep Kaur Sandhu
σ
Er. Gurjit Singh Bhathal
Er. Gurjit Singh Bhathal
α Punjabi University Punjabi University
σ Bhai Gurdas Polytechnic college

Send Message

To: Author

To Enhance the OTP Generation Process for Cloud Data Security using Diffie-Hellman and HMAC

Article Fingerprint

ReserarchID

CSTB0Y090

To Enhance the OTP Generation Process for Cloud Data Security using Diffie-Hellman and HMAC Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Abstract

Cloud computing is an innovation or distributed network where user can move their data and any application programming on it. In any case, there is a few issues in cloud computing, the main one is security on the grounds that each user store their helpful data on the network so they need their data ought to be protected from any unapproved access, any progressions that is not done for user’s benefit. There are diverse encryption methods utilized for security reason like FDE and FHE. To tackle the issue of Key management, Key Sharing different plans have been proposed. The outsider auditing plan will be fizzled, if the outsider’s security is bargained or of the outsider will be malicious. To tackle this issue, we will chip away at to design new modular for key sharing and key management in completely Homomorphic Encryption plan. In this paper, we have utilized the symmetric key understanding algorithm named Diffie Hellman, it is key trade algorithm with make session key between two gatherings who need to speak with each other and HMAC for the data integrity OTP(One Time Password) is made which gives more security. Because of this the issue of managing the key is expelled and data is more secured.

References

12 Cites in Article
  1. Bhavna Makhija,Vinitkumar Gupta (2013). Enhanced Data Security in Cloud Computing with Third Party Auditor.
  2. Vimmi Pandey (2013). Securing the Cloud Environment Using OTP.
  3. Sanjoli Singla,Jasmeet Singh (2013). Cloud Data Security using Authentication and Encryption Technique.
  4. Ankur Mishra,Ruchita Mathur,Shishir Jain,Jitendra Singh Rathore (2013). Cloud Computing Security.
  5. K Punithasurya,Esther Daniel,Dr Vasanthi (2013). A Novel Role Based Cross Domain Access Control Scheme for Cloud Storage.
  6. C Barron,H Yu,J Zhan (2013). Cloud Computing Security Case Studies and Research.
  7. Craig Gentry (2009). Fully homomorphic encryption using ideal lattices.
  8. Dawn Song,Elaine Shi,Ian Fischer,Umesh Shankar (2012). Cloud Data Protection for the Masses.
  9. Deyan Chen,Hong Zhao (2012). Data Security and Privacy Protection Issues in Cloud Computing.
  10. Purushothaman Deepanchakaravarthi,Dr (2012). An Approach for Data Storage Security in Cloud Computing.
  11. Dian-Yuan Han,Feng-Qing Zhang (2012). Applying Agents to the Data Security in Cloud Computing.
  12. Dr Nashaat El-Khameesy,Abdel Hossam,Rahman (2012). A Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

Gagandeep Kaur Sandhu. 2016. \u201cTo Enhance the OTP Generation Process for Cloud Data Security using Diffie-Hellman and HMAC\u201d. Global Journal of Computer Science and Technology - B: Cloud & Distributed GJCST-B Volume 16 (GJCST Volume 16 Issue B2): .

Download Citation

Issue Cover
GJCST Volume 16 Issue B2
Pg. 21- 26
Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Keywords
Classification
GJCST-B Classification: H.2.7 C.2.1 C.2.3
Version of record

v1.2

Issue date

August 17, 2016

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 7395
Total Downloads: 1862
2026 Trends
Related Research

Published Article

Cloud computing is an innovation or distributed network where user can move their data and any application programming on it. In any case, there is a few issues in cloud computing, the main one is security on the grounds that each user store their helpful data on the network so they need their data ought to be protected from any unapproved access, any progressions that is not done for user’s benefit. There are diverse encryption methods utilized for security reason like FDE and FHE. To tackle the issue of Key management, Key Sharing different plans have been proposed. The outsider auditing plan will be fizzled, if the outsider’s security is bargained or of the outsider will be malicious. To tackle this issue, we will chip away at to design new modular for key sharing and key management in completely Homomorphic Encryption plan. In this paper, we have utilized the symmetric key understanding algorithm named Diffie Hellman, it is key trade algorithm with make session key between two gatherings who need to speak with each other and HMAC for the data integrity OTP(One Time Password) is made which gives more security. Because of this the issue of managing the key is expelled and data is more secured.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

To Enhance the OTP Generation Process for Cloud Data Security using Diffie-Hellman and HMAC

Gagandeep Kaur Sandhu
Gagandeep Kaur Sandhu
Er. Gurjit Singh Bhathal
Er. Gurjit Singh Bhathal Bhai Gurdas Polytechnic college

Research Journals