SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 680
Survey on Fast Secure and Anonymous Key Agreement against Bad
Randomness for CloudComputing
Sai Mounica M
1
, Mohd Tajammul
2
1
MCA, School of CS and IT, Jain University, Bangalore, INDIA
2
Professor, School of CS and IT, Jain University, Bangalore, INDIA
------------------------------------------------------------------------***-----------------------------------------------------------------------
Abstract: On a cloud computer, services are usually
located on a network service provider's network and are
usually accessible remotely by cloud users through
social channels. An important agreement allows for the
establishment of a secure channel in a public channel so
that there is a secure connection between the cloud user
and the cloud service provider. Important existing cloud
computing agreements are plagued by other challenges,
e.g., detecting low connection delays, eliminating
certificate management issues, improving user privacy
and avoiding malware. To address these challenges, we
propose an anonymous 0- RTT protocol (authentication
and master agreement) against the malicious malware
of establishing a secure computer network. As a 0-RTT
protocol, it greatly accelerates the efficiency of the
secure channel establishment process. In addition, our
protocol does not requirecertificates to bind a public key
to a business ID and solve a certificate management
problem. Finally, a portable security protocol analysis is
also proposed. The protocol satisfies not only common
security features (e.g., known key security, anonymous
key sharing), but also strong security guarantees, i.e.,
user privacy and resistance to malicious popups. With
cloud computing, users can remotely store their data in
the cloud and use the most sought after high quality
applications
Data extraction: users are relieved of the burden of
storing and storing data when users place their (large-
size) data in the cloud, data integrity protection is a
challenge to enable public testing of cloud data security
is essential Users can request external testing. team to
check the integrity of its exported data. The goal is to
improve data security on unreliable cloud storage
servers that are usually limited to resources on the cloud
server and client. Considering that large data sizes are
stored on remote servers, accessing the entire file can be
costly for deploying input to the storage server. And
transferring a file across a network to a client can
consume heavy bandwidth. As storage capacity increases
far beyond the growth of data access and network
bandwidth, access and transfer of the entire archive even
occasionally severely limit the robustness of network
resources. In addition, the output input for data
verification interferes with the required server
bandwidth used for normal storageand recovery purposes.
The Third Party Auditor is the person responsible for
managing remote data in a global way. the purpose of we
improve data security through data management on
unreliable cloud storage servers limited resources oncloud
server and client.
Keywords: Cloud computing, secure channel, anonymous
authentication, bad random resistance, zero return and
return time.
Introduction:
Cloud computing has become one of the fastest growing
technologies in the IT industry in recent years. It covers a
large number of visual resources (e.g., computing power,
storage, platforms, andservices) and aims to maximize the
efficiency of resources. Remote cloud users can access those
services online using terminals, and access the required
resources with the payment model as you need. Successful
examples include Amazons S3 and EC2, Microsoft Azure,
Google App Engine and Rackspace etc. This new computer
model reduces startupand operating costs and increases the
speed of users. Its benefits are being enjoyed by many
companies and individuals by changing the IT solutions for
cloud computing. While enjoying the benefits of cloud
computing, its unique architectural features also raise some
insurmountable security challenges .
Cloud Computing has been seen as building the next
generation of IT business, thanks to its long list of
unprecedented benefits in the history of IT: on-demand self-
service, an ubiquitousnetwork.
On a cloud computer, resources are usually located on a
third-party network, that is, a cloud service provider (CSP)
network, and are usually accessible remotely by cloud users
through social channels. Processing is performed remotely
and the output is restored when the required processing is
completed. Due to the nature of cloud computing and the
openness of social channels, an attacker can attack various
forms, such as impersonation, listening, forking and
harassment. Therefore, verification and retention are
confidential equipment should be provided for
communication between the cloud user and the CSP, so that
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 681
only authorized users can access resources and any
attacker can violate the authenticity and confidentiality
of modified messages.
Besides, user privacy is also a major concern for cloud
computing, which prevents the attacker from realizing
that two messages are coming from the same cloud user.
Data in the cloud may containsensitive information, for
example, medical records, financial data. If user privacy
is not considered, the attacker may listen to the
communication in the cloud. Based on that, the attacker
mayobtain sensitive information, including who uses the
cloud, how often, and the amount of data that changes
and even theconnection is encrypted. Moreimportantly,
if an attacker finds public individuals (e.g., business
executives, celebrities) or other sensitive people incloud
culture, it may increase the likelihood that the attacker
will damage the cloud. In fact, an attacker may launch a
powerful attack (e.g., a phishing attack to steal sensitive
information) in order to steal the personal information
of cloudusers (e.g., Cloud Hack Celebrity ). Or theattacker
may begin to reject the attack on the service to block the
connection between the cloud used for diagnosis and the
patient. Causing a termination in acritical situation can
have serious consequences and even lead to death.
Therefore, user privacy is very important to cloud
computing and should be protected.
A Certified Key Agreement (AKA) is a widely used tool
for achieving additional goals, allowing CSP and user to
build a secure channel by agreeing on a shared session
key.
Besides, user privacy is also a major concern for cloud
computing, which prevents the attacker from realizing
that two messages are coming from the same cloud user.
Data in the cloud may contain sensitive information, for
example, medical records, financial data. If userprivacy is
not considered, the attacker may listen to the
communication in the cloud. Based on that, the attacker
mayobtain sensitive information, including who uses the
cloud, how often, and the amount of data that changes and
even the connection is encrypted. Moreimportantly, if an
attacker finds publicindividuals (e.g., business executives,
celebrities) or other sensitive people in cloud culture, it
may increase the likelihood that the attacker will damage
the cloud. In fact, an attacker may launch a powerful
attack (e.g., a phishing attack to steal sensitive information
) in order to steal the personal information of cloudusers
(e.g., Cloud Hack Celebrity ). Or theattacker may begin to
reject the attack on the service to block the connection
between the cloud used for diagnosis and the patient.
Causing a termination in a critical situation can have
serious consequences and even lead to death. Therefore,
user privacy is very important to cloud computing and
should be protected.
Zero travel time (0-RTT) chat mode that allows one
business (e.g., cloud user) to send encrypted data using a
session key and a session key message chat to a previously
visited business. (e.g., CSP). The AKA protocol that supports
0-RTT will speed up the connection to the servers that users
often visit. In particular,it is expected to bring low delays in
situations that include high packet loss or high delays (e.g.,
cloud users with mobile devices) . Most existing AKA
agreements (including those that support 0-RTT) are built
on a traditional PKI-basedcryptosystem that has a certificate
management problem. Uncertified public key cryptography
(CL-PKC)) was introduced to eliminate the certificate
management problem in the PKI cryptosystem. However, a
few certified AKA supporting 0-RTT is recommended for
official safety analysis.
AKA protocols rely on random passwords that are used to
prevent attackers from predicting session session keys that
result in and / or violate user privacy. In a cloud computing,
cloud services typically use visual technology, while guests
(e.g., cloudusers) use hypervisor-controlled resources [16]. If
the hypervisor is malicious, it may predict random numbers
[16] and endangerthe safety of the AKA protocol. Moreover,
as leaked by Snowden in SXSW 2014 [17], compared to a
complete breach of the cryptographic scheme, it is easy to
weaken the system by attacking the pseudorandom generator
(PRG). In fact, a well-designedor poorly designed PRG can be
used to produce such a random random event. The most
popular Dual EC PRG feature was theNIST, ANSI and ISO [18]
and was used in other products, eg OpenSSL-FIPS v2,
Microsoft's SChannel and the BSAFE RSA library [19] ].
Therefore, secure protocols, e.g., TLS / SSL, made using Dual
EC havea risk of breach [17]. For example, if the RSA BSAFE
library (which uses Dual EC by default) is selected, then all
TLSconnections made using this tool may be compromised.
Literature Review
The key agreement first introduced by Diffie and Hellman
is widely used in cloud computing to secure
transportation. In recent years, various key AKA
agreements have been proposed.
However, most of them only support one or more RTT,
where one or more connections (between organizations,
e.g., cloud user and CSP) are required than 0-RTT. As
shown in, 0-RTT hasmuch better performance than one or
more RTT, e.g., to improve connection speed by 34% on
average. In fact, some AKA agreements in support of 0-
RTT have already been drafted among them the most
popular of the upcoming TLS
1.3 and Google QUIC. Both may ensure user privacy and
may have a significant impact on the development of cloud
user experience. The AKA agreements discussed above are
based on a traditional PKI-based cryptosystem, in which
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 682
each entity must obtain acertificate-certified certificate
in order to bind its ownership with its public key.
Generally, the problem of certificate management is a
burden .
Certified public key cryptography (CL- PKC) was
introduced to alleviate the problem of certificate
management. For CL-PKC, the public key to a business
is its identity associated with the public value
generated by itself. Since no certificate is in use, overall
certificate management is downgraded. Similar to AKA
agreements in a traditional PKI- based cryptosystem,
most AKAagreements in CL-PKC do not support 0-RTT.
The first uncertified 0-RTT AKA protocol proposed.
However, no official security analysis is provided for
this protocol. The first flawlessly protected without a
certificate 0-RTT AKAprotocol was proposed in . Later,
several AKA-certified 0-RTT protocols were also
proposed. Unfortunately, user privacy is not considered
in the above protocols. In two anonymous AKA
computer cloud protocols were proposed. However,
none of them support the 0-RTT and provide a formal
security analysis. With the best of the authors'
information, no AKA unsecured secure protocol
supports both 0-RTT anduser privacy.
The security of AKA protocols is very much in line with
the unpredictability of random numbers. In particular,
there are three ways to deal with bad planning,namely,
a fixed, fenced or unsupported cryptosystem. The first
avoids random use. However, it does require that the
message sent be minimal entropy. In fact, the entropy
of the message in the real world is often low . The
second can be considered as an extension of the first.In
this setting, random use and system security are only
guaranteed if the message and random together have
enough min-entropy. However, the attacker may break
the system, when selecting a PRG with a backdoor /
poorlyconstructed and the message to be sent without
high min-entropy. The latter assumes that each user
carries a high quality seed and must make a nonce
using PRG. Compared to the first two methods, it
provides better guarantees as the attacker must
completely break the PRG and intervene in the user's
system toextract the seeds simultaneously, then he can
violate system security. So, in this paper, we do it with
this line to avoid badchaos.
We focus on cloud data protection, which has
always been an important aspect of service quality.
To ensure the legitimacy of user data in the cloud, we
propose an effective and flexible distributed scheme
that has two key features, contrasting with the
predecessors.
By using a homomorphism token with distributed data
verification code, our system achieves the integration of
storage integrity insurance with local data error
processing, i.e., identifying mismatched servers.
We also show how our main program is to support TPA
cluster testing in submissions from multiple users.
Homomorphic credentials are an unforgettable metadata
generated by individual data blocks, which can be securely
integrated in a way that assures the auditor that the line
block of datablocks is computerized correctly by verifying
only the integrated certificate. To look at it all in order to
achieve confidentiality in public research, we propose a
special integration of homomorphic confirmation with
random mask methods. In our protocol, the linear
combination of sample blocks in server response is
randomly generated by a random artificial activity (PRF).
The proposed plan is as follows:
• Setup phase
• Audit phase
Conclusions
Given the popularity of cloud archive storage, it is
desirable to enable clients to ensure the integrity of their
data in the cloud. We design and implement an effective
data integrity protection (DIP) system for small active
memory recovery codes (FMSR) under multiple server
settings. Our DIP system maintains error tolerance and
repairs FMSR savingsstructures.
To understand the effectiveness of the FMSR and DIP
integration, we evaluate its security capabilities, evaluate
its effective time using testbed tests, and perform cost-
effectiveness analysis.
References
 L. Zhang, X. Meng, K. Choo, Y. Zhang, and F. Dai,
“Privacypreserving cloud establishment and data
dissemination scheme for vehicular cloud,” IEEE
Transactions on Dependable and Secure Computing,
2018, doi: 10.1109/TDSC.2018.2797190.
 M. Jouini and L. Rabai, “A security framework for secure
cloud computing environments,” in Cloud Security:
Concepts, Methodologies, Tools, and Applications, 2019,
pp. 249–263.
 J. Li, L. Zhang, J. Liu, H. Qian, and Z. Dong, “Privacy-
preserving public auditing protocol for low-performance
end devices in cloud,” IEEE Transactions on Information
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 683
Forensics and Security, vol. 11, no. 11, pp. 2572–2583,
2016.
 M. ARMBRUST, A. FOX, R. GRIFFITH, A. D. JOSEPH, R.
KATZ, A. KONWINSKI, G. LEE, D. PATTERSON, A.
RABKIN, I. STOICA, AND M. ZAHARIA. A VIEW OF
CLOUD COMPUTING. COMMUNICATIONS OF THE
ACM, 53(4):50–58, 2010
 H. Krawczyk and H. Wee, “The OPTLS protocol and
TLS 1.3,” in 2016 IEEE European Symposium on
Security and Privacy, 2016, pp. 81–96.
 B. Hale, T. Jager, S. Lauer, and J. Schwenk, “Simple
security definitions for and constructions of 0-rtt key
exchange,” in 15th International Conference on
Applied Cryptography and Network Security, 2017,
pp. 20– 38.
 L. Zhang, “Key management scheme for secure
channel establishment in fog computing,” IEEE
Transactions onCloud Computing,
doi:10.1109/TCC.2019.2903254

More Related Content

Similar to Survey on Fast Secure and Anonymous Key Agreement against Bad Randomness for CloudComputing

Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party AuditorSecurity Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditor
ijsrd.com
 
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
Editor IJMTER
 
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
ijtsrd
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
Er. rahul abhishek
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the Cloud
Kumar Goud
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
Iaetsd Iaetsd
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
IRJET Journal
 
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET Journal
 
Anonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in CloudAnonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in Cloud
IRJET Journal
 
Security in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureSecurity in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architecture
eSAT Journals
 
Security in multi cloud data storage with sic
Security in multi cloud data storage with sicSecurity in multi cloud data storage with sic
Security in multi cloud data storage with sic
eSAT Publishing House
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
IJERA Editor
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET Journal
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Editor IJMTER
 
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
IJSRED
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
ijsrd.com
 
Information Leakage Prevention In Cloud Computing
Information Leakage Prevention In Cloud ComputingInformation Leakage Prevention In Cloud Computing
Information Leakage Prevention In Cloud Computing
IJERA Editor
 
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Security threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computingSecurity threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computing
Jahangeer Qadiree
 

Similar to Survey on Fast Secure and Anonymous Key Agreement against Bad Randomness for CloudComputing (20)

Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party AuditorSecurity Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditor
 
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
 
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the Cloud
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
 
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
 
Anonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in CloudAnonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in Cloud
 
Security in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureSecurity in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architecture
 
Security in multi cloud data storage with sic
Security in multi cloud data storage with sicSecurity in multi cloud data storage with sic
Security in multi cloud data storage with sic
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
 
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
 
Information Leakage Prevention In Cloud Computing
Information Leakage Prevention In Cloud ComputingInformation Leakage Prevention In Cloud Computing
Information Leakage Prevention In Cloud Computing
 
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Security threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computingSecurity threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computing
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICSUNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
vmspraneeth
 
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdfAsymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
felixwold
 
Bituminous road construction project based learning report
Bituminous road construction project based learning reportBituminous road construction project based learning report
Bituminous road construction project based learning report
CE19KaushlendraKumar
 
Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...
pvpriya2
 
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Transcat
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
nedcocy
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
ElakkiaU
 
Generative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdfGenerative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdf
mahaffeycheryld
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 
Open Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surfaceOpen Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surface
Indrajeet sahu
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
Paris Salesforce Developer Group
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
PriyankaKilaniya
 
SCALING OF MOS CIRCUITS m .pptx
SCALING OF MOS CIRCUITS m                 .pptxSCALING OF MOS CIRCUITS m                 .pptx
SCALING OF MOS CIRCUITS m .pptx
harshapolam10
 
Supermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdfSupermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdf
Kamal Acharya
 
Levelised Cost of Hydrogen (LCOH) Calculator Manual
Levelised Cost of Hydrogen  (LCOH) Calculator ManualLevelised Cost of Hydrogen  (LCOH) Calculator Manual
Levelised Cost of Hydrogen (LCOH) Calculator Manual
Massimo Talia
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
Atif Razi
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
ijaia
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
uqyfuc
 
Blood finder application project report (1).pdf
Blood finder application project report (1).pdfBlood finder application project report (1).pdf
Blood finder application project report (1).pdf
Kamal Acharya
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
upoux
 

Recently uploaded (20)

UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICSUNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
 
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdfAsymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
 
Bituminous road construction project based learning report
Bituminous road construction project based learning reportBituminous road construction project based learning report
Bituminous road construction project based learning report
 
Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...
 
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
 
Generative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdfGenerative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdf
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 
Open Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surfaceOpen Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surface
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
 
SCALING OF MOS CIRCUITS m .pptx
SCALING OF MOS CIRCUITS m                 .pptxSCALING OF MOS CIRCUITS m                 .pptx
SCALING OF MOS CIRCUITS m .pptx
 
Supermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdfSupermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdf
 
Levelised Cost of Hydrogen (LCOH) Calculator Manual
Levelised Cost of Hydrogen  (LCOH) Calculator ManualLevelised Cost of Hydrogen  (LCOH) Calculator Manual
Levelised Cost of Hydrogen (LCOH) Calculator Manual
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
 
Blood finder application project report (1).pdf
Blood finder application project report (1).pdfBlood finder application project report (1).pdf
Blood finder application project report (1).pdf
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
 

Survey on Fast Secure and Anonymous Key Agreement against Bad Randomness for CloudComputing

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 680 Survey on Fast Secure and Anonymous Key Agreement against Bad Randomness for CloudComputing Sai Mounica M 1 , Mohd Tajammul 2 1 MCA, School of CS and IT, Jain University, Bangalore, INDIA 2 Professor, School of CS and IT, Jain University, Bangalore, INDIA ------------------------------------------------------------------------***----------------------------------------------------------------------- Abstract: On a cloud computer, services are usually located on a network service provider's network and are usually accessible remotely by cloud users through social channels. An important agreement allows for the establishment of a secure channel in a public channel so that there is a secure connection between the cloud user and the cloud service provider. Important existing cloud computing agreements are plagued by other challenges, e.g., detecting low connection delays, eliminating certificate management issues, improving user privacy and avoiding malware. To address these challenges, we propose an anonymous 0- RTT protocol (authentication and master agreement) against the malicious malware of establishing a secure computer network. As a 0-RTT protocol, it greatly accelerates the efficiency of the secure channel establishment process. In addition, our protocol does not requirecertificates to bind a public key to a business ID and solve a certificate management problem. Finally, a portable security protocol analysis is also proposed. The protocol satisfies not only common security features (e.g., known key security, anonymous key sharing), but also strong security guarantees, i.e., user privacy and resistance to malicious popups. With cloud computing, users can remotely store their data in the cloud and use the most sought after high quality applications Data extraction: users are relieved of the burden of storing and storing data when users place their (large- size) data in the cloud, data integrity protection is a challenge to enable public testing of cloud data security is essential Users can request external testing. team to check the integrity of its exported data. The goal is to improve data security on unreliable cloud storage servers that are usually limited to resources on the cloud server and client. Considering that large data sizes are stored on remote servers, accessing the entire file can be costly for deploying input to the storage server. And transferring a file across a network to a client can consume heavy bandwidth. As storage capacity increases far beyond the growth of data access and network bandwidth, access and transfer of the entire archive even occasionally severely limit the robustness of network resources. In addition, the output input for data verification interferes with the required server bandwidth used for normal storageand recovery purposes. The Third Party Auditor is the person responsible for managing remote data in a global way. the purpose of we improve data security through data management on unreliable cloud storage servers limited resources oncloud server and client. Keywords: Cloud computing, secure channel, anonymous authentication, bad random resistance, zero return and return time. Introduction: Cloud computing has become one of the fastest growing technologies in the IT industry in recent years. It covers a large number of visual resources (e.g., computing power, storage, platforms, andservices) and aims to maximize the efficiency of resources. Remote cloud users can access those services online using terminals, and access the required resources with the payment model as you need. Successful examples include Amazons S3 and EC2, Microsoft Azure, Google App Engine and Rackspace etc. This new computer model reduces startupand operating costs and increases the speed of users. Its benefits are being enjoyed by many companies and individuals by changing the IT solutions for cloud computing. While enjoying the benefits of cloud computing, its unique architectural features also raise some insurmountable security challenges . Cloud Computing has been seen as building the next generation of IT business, thanks to its long list of unprecedented benefits in the history of IT: on-demand self- service, an ubiquitousnetwork. On a cloud computer, resources are usually located on a third-party network, that is, a cloud service provider (CSP) network, and are usually accessible remotely by cloud users through social channels. Processing is performed remotely and the output is restored when the required processing is completed. Due to the nature of cloud computing and the openness of social channels, an attacker can attack various forms, such as impersonation, listening, forking and harassment. Therefore, verification and retention are confidential equipment should be provided for communication between the cloud user and the CSP, so that
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 681 only authorized users can access resources and any attacker can violate the authenticity and confidentiality of modified messages. Besides, user privacy is also a major concern for cloud computing, which prevents the attacker from realizing that two messages are coming from the same cloud user. Data in the cloud may containsensitive information, for example, medical records, financial data. If user privacy is not considered, the attacker may listen to the communication in the cloud. Based on that, the attacker mayobtain sensitive information, including who uses the cloud, how often, and the amount of data that changes and even theconnection is encrypted. Moreimportantly, if an attacker finds public individuals (e.g., business executives, celebrities) or other sensitive people incloud culture, it may increase the likelihood that the attacker will damage the cloud. In fact, an attacker may launch a powerful attack (e.g., a phishing attack to steal sensitive information) in order to steal the personal information of cloudusers (e.g., Cloud Hack Celebrity ). Or theattacker may begin to reject the attack on the service to block the connection between the cloud used for diagnosis and the patient. Causing a termination in acritical situation can have serious consequences and even lead to death. Therefore, user privacy is very important to cloud computing and should be protected. A Certified Key Agreement (AKA) is a widely used tool for achieving additional goals, allowing CSP and user to build a secure channel by agreeing on a shared session key. Besides, user privacy is also a major concern for cloud computing, which prevents the attacker from realizing that two messages are coming from the same cloud user. Data in the cloud may contain sensitive information, for example, medical records, financial data. If userprivacy is not considered, the attacker may listen to the communication in the cloud. Based on that, the attacker mayobtain sensitive information, including who uses the cloud, how often, and the amount of data that changes and even the connection is encrypted. Moreimportantly, if an attacker finds publicindividuals (e.g., business executives, celebrities) or other sensitive people in cloud culture, it may increase the likelihood that the attacker will damage the cloud. In fact, an attacker may launch a powerful attack (e.g., a phishing attack to steal sensitive information ) in order to steal the personal information of cloudusers (e.g., Cloud Hack Celebrity ). Or theattacker may begin to reject the attack on the service to block the connection between the cloud used for diagnosis and the patient. Causing a termination in a critical situation can have serious consequences and even lead to death. Therefore, user privacy is very important to cloud computing and should be protected. Zero travel time (0-RTT) chat mode that allows one business (e.g., cloud user) to send encrypted data using a session key and a session key message chat to a previously visited business. (e.g., CSP). The AKA protocol that supports 0-RTT will speed up the connection to the servers that users often visit. In particular,it is expected to bring low delays in situations that include high packet loss or high delays (e.g., cloud users with mobile devices) . Most existing AKA agreements (including those that support 0-RTT) are built on a traditional PKI-basedcryptosystem that has a certificate management problem. Uncertified public key cryptography (CL-PKC)) was introduced to eliminate the certificate management problem in the PKI cryptosystem. However, a few certified AKA supporting 0-RTT is recommended for official safety analysis. AKA protocols rely on random passwords that are used to prevent attackers from predicting session session keys that result in and / or violate user privacy. In a cloud computing, cloud services typically use visual technology, while guests (e.g., cloudusers) use hypervisor-controlled resources [16]. If the hypervisor is malicious, it may predict random numbers [16] and endangerthe safety of the AKA protocol. Moreover, as leaked by Snowden in SXSW 2014 [17], compared to a complete breach of the cryptographic scheme, it is easy to weaken the system by attacking the pseudorandom generator (PRG). In fact, a well-designedor poorly designed PRG can be used to produce such a random random event. The most popular Dual EC PRG feature was theNIST, ANSI and ISO [18] and was used in other products, eg OpenSSL-FIPS v2, Microsoft's SChannel and the BSAFE RSA library [19] ]. Therefore, secure protocols, e.g., TLS / SSL, made using Dual EC havea risk of breach [17]. For example, if the RSA BSAFE library (which uses Dual EC by default) is selected, then all TLSconnections made using this tool may be compromised. Literature Review The key agreement first introduced by Diffie and Hellman is widely used in cloud computing to secure transportation. In recent years, various key AKA agreements have been proposed. However, most of them only support one or more RTT, where one or more connections (between organizations, e.g., cloud user and CSP) are required than 0-RTT. As shown in, 0-RTT hasmuch better performance than one or more RTT, e.g., to improve connection speed by 34% on average. In fact, some AKA agreements in support of 0- RTT have already been drafted among them the most popular of the upcoming TLS 1.3 and Google QUIC. Both may ensure user privacy and may have a significant impact on the development of cloud user experience. The AKA agreements discussed above are based on a traditional PKI-based cryptosystem, in which
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 682 each entity must obtain acertificate-certified certificate in order to bind its ownership with its public key. Generally, the problem of certificate management is a burden . Certified public key cryptography (CL- PKC) was introduced to alleviate the problem of certificate management. For CL-PKC, the public key to a business is its identity associated with the public value generated by itself. Since no certificate is in use, overall certificate management is downgraded. Similar to AKA agreements in a traditional PKI- based cryptosystem, most AKAagreements in CL-PKC do not support 0-RTT. The first uncertified 0-RTT AKA protocol proposed. However, no official security analysis is provided for this protocol. The first flawlessly protected without a certificate 0-RTT AKAprotocol was proposed in . Later, several AKA-certified 0-RTT protocols were also proposed. Unfortunately, user privacy is not considered in the above protocols. In two anonymous AKA computer cloud protocols were proposed. However, none of them support the 0-RTT and provide a formal security analysis. With the best of the authors' information, no AKA unsecured secure protocol supports both 0-RTT anduser privacy. The security of AKA protocols is very much in line with the unpredictability of random numbers. In particular, there are three ways to deal with bad planning,namely, a fixed, fenced or unsupported cryptosystem. The first avoids random use. However, it does require that the message sent be minimal entropy. In fact, the entropy of the message in the real world is often low . The second can be considered as an extension of the first.In this setting, random use and system security are only guaranteed if the message and random together have enough min-entropy. However, the attacker may break the system, when selecting a PRG with a backdoor / poorlyconstructed and the message to be sent without high min-entropy. The latter assumes that each user carries a high quality seed and must make a nonce using PRG. Compared to the first two methods, it provides better guarantees as the attacker must completely break the PRG and intervene in the user's system toextract the seeds simultaneously, then he can violate system security. So, in this paper, we do it with this line to avoid badchaos. We focus on cloud data protection, which has always been an important aspect of service quality. To ensure the legitimacy of user data in the cloud, we propose an effective and flexible distributed scheme that has two key features, contrasting with the predecessors. By using a homomorphism token with distributed data verification code, our system achieves the integration of storage integrity insurance with local data error processing, i.e., identifying mismatched servers. We also show how our main program is to support TPA cluster testing in submissions from multiple users. Homomorphic credentials are an unforgettable metadata generated by individual data blocks, which can be securely integrated in a way that assures the auditor that the line block of datablocks is computerized correctly by verifying only the integrated certificate. To look at it all in order to achieve confidentiality in public research, we propose a special integration of homomorphic confirmation with random mask methods. In our protocol, the linear combination of sample blocks in server response is randomly generated by a random artificial activity (PRF). The proposed plan is as follows: • Setup phase • Audit phase Conclusions Given the popularity of cloud archive storage, it is desirable to enable clients to ensure the integrity of their data in the cloud. We design and implement an effective data integrity protection (DIP) system for small active memory recovery codes (FMSR) under multiple server settings. Our DIP system maintains error tolerance and repairs FMSR savingsstructures. To understand the effectiveness of the FMSR and DIP integration, we evaluate its security capabilities, evaluate its effective time using testbed tests, and perform cost- effectiveness analysis. References  L. Zhang, X. Meng, K. Choo, Y. Zhang, and F. Dai, “Privacypreserving cloud establishment and data dissemination scheme for vehicular cloud,” IEEE Transactions on Dependable and Secure Computing, 2018, doi: 10.1109/TDSC.2018.2797190.  M. Jouini and L. Rabai, “A security framework for secure cloud computing environments,” in Cloud Security: Concepts, Methodologies, Tools, and Applications, 2019, pp. 249–263.  J. Li, L. Zhang, J. Liu, H. Qian, and Z. Dong, “Privacy- preserving public auditing protocol for low-performance end devices in cloud,” IEEE Transactions on Information
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 683 Forensics and Security, vol. 11, no. 11, pp. 2572–2583, 2016.  M. ARMBRUST, A. FOX, R. GRIFFITH, A. D. JOSEPH, R. KATZ, A. KONWINSKI, G. LEE, D. PATTERSON, A. RABKIN, I. STOICA, AND M. ZAHARIA. A VIEW OF CLOUD COMPUTING. COMMUNICATIONS OF THE ACM, 53(4):50–58, 2010  H. Krawczyk and H. Wee, “The OPTLS protocol and TLS 1.3,” in 2016 IEEE European Symposium on Security and Privacy, 2016, pp. 81–96.  B. Hale, T. Jager, S. Lauer, and J. Schwenk, “Simple security definitions for and constructions of 0-rtt key exchange,” in 15th International Conference on Applied Cryptography and Network Security, 2017, pp. 20– 38.  L. Zhang, “Key management scheme for secure channel establishment in fog computing,” IEEE Transactions onCloud Computing, doi:10.1109/TCC.2019.2903254