Design and Implementation of Strong Security Architecture for Amazon Web Service based on Cloud Applications
Madan Solanki1, Vrinda Tokekar2
1Madan Solanki, Department of Information Technology, Institute of Engineering and Technology, Devi Ahilya Vishwavidyalaya Khandwa Road Indore (M.P.), India.
2Prof. (Dr.) Vrinda Tokekar, Professor and Head, Department of Information Technology, Institute of Engineering and Technology, Devi Ahilya Vishwavidyalaya Khandwa Road Indore (M.P.), India.
Manuscript received on 13 October 2022 | Revised Manuscript received on 20 October 2022 | Manuscript Accepted on 15 November 2022 | Manuscript published on 30 November 2022 | PP: 12-17 | Volume-11 Issue-12, November 2022 | Retrieval Number: 100.1/ijitee.L932411111222 | DOI: 10.35940/ijitee.L9324.11111222
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Cloud applications are becoming a necessary part of modern life. Security is one of the most important non-functional requirements of every solution. Early days, security and data privacy was just luxury part of software development and it was an optional requirement but nowadays it plays a critical role in daily life. The presented work will be made to observe the need for symmetric security algorithms in Cloud application with Amazon web service. This work observes that the current security level of existing applications recommend improved security solutions to enhance the security level as well performance of proposed architecture. This work recommends Blowfish, RC6 algorithm (symmetric key cryptography) can be used to achieve confidentiality during communication Amazon web service Platform. It also considers the MD5 algorithm to maintain the integrity and modified Kerberos algorithm to achieve authentication. The complete work will propose a security architecture having solution to achieve confidentiality, integrity with strong authentication policy for Cloud application development in Amazon web service. The strong security architecture provide for data and minimum executive time in upload and download file, different key size, file size and chunking size in file. File size divided into chunk 512 bit, 1024 bit, 2048 bit after process in Amazon web service, we are found the optimum time are chunking file size 2048 bits reduce time in encryption and decryption data process and maintain strong security data file in communication including file size 5, 10, 15 and 20 Megabyte.
Keywords: Cloud Computing, RC6, Blowfish, Kerberos Authentication, MD5
Scope of the Article: Cloud Computing