Cloud Security through Key Agreement
Subramanian Anbazhagan1, K.Somasundaram2

1Subramanian Anbazhagan, Research Scholar (Karpagam University), Computer Science and Engineering, Karpagam University, Pollachi Main Road, Eachanari Post, Coimbatore 641021, India.
2Dr. K. Somasundaram, Research Guide (Karpagam University), Professor, Department of Computer Science and Engineering,Jaya Engineering College, Thiruvallur , Tamilnadu, India.

Manuscript received on August 11, 2013. | Revised Manuscript received on August 15, 2013. | Manuscript published on August 25, 2013. | PP: 1-4 | Volume-1, Issue-10, August 2013. | Retrieval Number: J04240811013/2013©BEIESP

Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (

Abstract: Cloud computing refers to applications and services that run on a distributed network using virtualized and accessed by common internet protocols and networking standards. It is distinguished by the notion that resources are virtual and limitless and that details of the physical systems on which software runs are abstracted from the user. Cloud Computing is a style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet. Users need not have knowledge of, expertise in, or control over the technology infrastructure in the “cloud” that supports them. The concept incorporates technologies that have the common theme of reliance on the Internet for satisfying the computing needs of the users. Cloud Computing services usually provide applications online that are accessed from a web browser, while the software and data are stored on the servers. As the users deal their sensitive data to clouds i.e. public domains, the major hurdles for cloud adoption are lack of security and access control. The main setback is that the insecure information flows as service provider can access multiple virtual machines in clouds. So it is necessary to build up proper security for cloud implementation. Therefore the main aim of this paper is to provide cloud computing security through secret key using a public-key scheme. This article proposes a protocol which enables two users to establish a secret key using a public-key scheme based on discrete logarithms. The protocol is secure only if the authenticity of the two participants can be established.
Keywords: Cloud computing, cloud security, cloud services, domains, public-key scheme secret key ,virtualized resources, virtual machines.