Downloads: 115 | Views: 232
M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 5, May 2015 | Popularity: 6.4 / 10
Achieving Data Confidentiality and Authentication in Cloud Computing
Abhilash S Nath, Reshna T
Abstract: The Data sharing is one of the important property in cloud computing. Today our IT industry is developing huge amount of data. it is so difficult to store a large amount of data. Its also expensive and it-s not easy to secure those documents which are personal or confidential. Cloud computing is such a technology that help us to maintain this large amount of data in a distributed manner in a network. It-s a technology that is rapidly progressing in today-s world. The huge building for the servers are becoming imaginary when this technology came. But the security loop holes has given a impact to this technology. It-s not easy to handle a data in a unsecure channel. we need some data confidentiality and integrity in our systems. We must also take care the security also meet the expenses of the company in a desired wish. We want a more better encryption schemes used in cloud for data confidentiality one is such that using of a constant size aggregate key where release a constant-size aggregate key for required choices of ciphertext set in cloud s, but the other encrypted files which remain outside should be set confidential. In authentication where users authenticate using a two factor technology where password and a secret number play a role. This technology of using a password and a number for recovery and not lose of personal data for user for authentication even after a failure of Kerberos protocol. This gives user a trust and a thrust to cloud security
Keywords: Data confidentiality, Authentication, Key-aggregation, Encryption, Decryption
Edition: Volume 4 Issue 5, May 2015
Pages: 1937 - 1942
Similar Articles
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Downloads: 1
Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021
Pages: 475 - 485Light Weight WSN Authentication Protocol Suite
Rahul K Drolia
Downloads: 5 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022
Pages: 772 - 776Cryptographic Algorithm to Augment Data Security
Vipin R Bharadwaj, Nalina V, Rithvik Mohan V
Downloads: 12 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021
Pages: 788 - 791A New Cryptography Algorithm Based on ASCII Code
Yaser M.A. Abualkas
Downloads: 101
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1525 - 1529Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar