Fast and Secure Anonyamous Key Agreement Against Bad

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 12

Fast and Secure Anonymous

Key Agreement Against Bad


Randomness For cl0ud
Computing
Abstract

In cloud computing, resources are usually in cloud service provider’s network and typically
accessed remotely by the cloud users via public channels. Key agreement enables secure channel
establishment over a public channel for the secure communications between a cloud user and a cloud
service provider. Existing key agreement protocols for cloud computing suffer from some challenges, e.g.,
realizing low connection delay, eliminating certificate management problem, enhancing user privacy and
avoiding bad randomness. To tackle these challenges, we propose a certificate less 0-RTT anonymous
AKA protocol against bad randomness for secure channel establishment in cloud computing. As a 0-RTT
protocol, it significantly speeds up the efficiency of the secure channel establishment process. Further, our
protocol does not need for the certificates to bind a public key with an entity’s identity and hence solves
the certificate management problem. Finally, concrete security analysis of the protocol is also proposed.
The protocol not only satisfies the traditional security attributes (e.g., known-key security, unknown key-
System Analysis

 EXISTING SYSTEM

 Existing AKA protocols for cloud computing suffer from the challenges like
reducing connection delay, eliminating certificate management problem, enhancing user
privacy and avoiding bad randomness. In our paper, we present a certificate less 0-RTT
anonymous AKA protocol against bad randomness for cloud computing to address the
above challenges.
Existing System

 Existing AKA protocols for cloud computing suffer from the challenges like
reducing connection delay, eliminating certificate management problem, enhancing user
privacy and avoiding bad randomness. In our paper, we present a certificate less 0-RTT
anonymous AKA protocol against bad randomness for cloud computing to address the
above challenges.
Proposed System

 This paper focuses on the secure channel establishment between a cloud user and a
CSP. A CSP offers various services. It will provide the corresponding service according to the
request of a cloud user. To protect cloud service security, a secure channel (i.e., a secure session
key) has to be established between the cloud user and the CSP. We consider the case that a
cloud user has already visited the CSP previously. The cloud user then may send data encrypted
using a session key along with the session key negotiation message to the CSP
System Architecture
Sequence Diagram

DATA
KGC CSP
OWNER

USER 1 SHARE KEY

UPLOAD FLE VIEW FILE

USER 2

REQUEST
KEY

USER N VERIFY KEY


DOWNLOAD
DFD Diagram

DATA
UPLOAD FILE REQUEST KEY
OWNER

LEVEL 0

KGC VIEW REQUEST GENERATE KEY

LEVEL 1

CSP VIEW FILES DOWNLOAD IT

LEVEL 2
Collabration Diagram

request
Data Owner
(Register)

KGC

Request Share Key

View File or
Secret Key
Download
System Specification

HARDWARE SYSTEM REQUIREMENT

Processor - Pentium –III


Speed - 1.1 Ghz

RAM - 256 MB (min)

Hard Disk - 20 GB

Floppy Drive - 1.44 MB

Key Board - Standard Windows Keyboard

Mouse - Two or Three Button Mouse

Monitor - SVGA
S/w System Requirement

S/W SYSTEM REQUIREMENT


 Operating System : Windows 95/98/2000/NT4.0.

 Application Server : Tomcat6.0

 Front End : HTML, Java.

 Scripts : JavaScript.

 Server side Script : Java Server Pages.

 Database : MySQL.

 Database Connectivity: JDBC.


Conclusion

CONCLUSION

We have proposed a certificate less 0-RTT anonymous AKA


protocol against bad randomness for cloud computing. It solved the
challenges like reducing connection delay, eliminating certificate
management problem, enhancing user privacy and avoiding bad
randomness facing in cloud computing. Simulation results show that
our protocol has very low latency and enables fast secure and
anonymous channel establishment for cloud computing.

You might also like