An Identity based Authentication and Data Encryption in Cloud Computing
International Journal of Computer Science and Engineering |
© 2017 by SSRG - IJCSE Journal |
Volume 4 Issue 10 |
Year of Publication : 2017 |
Authors : Sravan Kumar Nalla, Konni Srinivasarao |
How to Cite?
Sravan Kumar Nalla, Konni Srinivasarao, "An Identity based Authentication and Data Encryption in Cloud Computing," SSRG International Journal of Computer Science and Engineering , vol. 4, no. 10, pp. 19-23, 2017. Crossref, https://doi.org/10.14445/23488387/IJCSE-V4I10P105
Abstract:
Now a days security place an important role for data privacy in a cloud computing. Moving on to data security in the cloud usually implies relying on the cloud service provider for protection. The cloud service provider could potentially access the data or even provide it to third parties. More ever one should trust the cloud service provider to legitimately apply the access control rules defined by the data owner for other users. In the cloud computing one of the problems is transfer data from one cloud service provider to another cloud service provider. Because to share data from more than one cloud service provide is face the problem of data security. In the cloud computing is another problem is authorization of users in the cloud. So that by overcome those problems we can implement a novel multi authority identity based technique for authentication of users in the cloud and an efficient cryptography technique for data encryption and re encryption of data in the cloud. Another enhancement of this paper is proposed authorization model with more action like modification and deletion. By implementing those techniques we can provide more efficiency of in a novel network and also provide more security of transferred data in the cloud.
Keywords:
Authentication, Key Generation, Mater Key, Cryptography, Message Digest, Signature, Random Nonce.
References:
[1] Cloud Security Alliance, “Security guidance for critical areas of focus in cloud computing v3.0,” CSA, Tech. Rep., 2003.
[2] A. Lawall, D. Reichelt, and T. Schaller, “Resource management andauthorization for cloud services,” in Proceedings of the 7th International Conference on Subject-Oriented Business Process Management,ser. S-BPM ONE ’15, New York, NY, USA, 2015, pp. 18:1–18:8.
[3] D. Y. Chang, M. Benantar, J. Y.-c. Chang, and V. Venkataramappa, “Authentication and authorization methods for cloud computing platform security,” Jan. 1 2015, uS Patent 20,150,007,274.
[4] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attributebased encryption for fine-grained access control of encrypted data,” in Proceedings of the 13th ACM Conference on Computer and Communications Security, ser. CCS ’06, New York, NY, USA, 2006, pp. 89–98.
[5] B. B and V. P, “Extensive survey on usage of attribute based encryption in cloud,” Journal of Emerging Technologies in Web Intelligence,vol. 6, no. 3, 2014.
[6] B. Waters, “Cipher text-policy attribute-based encryption: An expressive, efficient, and provably secure realization,” in Public Key Cryptography - PKC 2011, 2011, vol. 6571, pp. 53–70.
[7] O. K. J. Mohammad, S. Abbas, E. M. El-Horbaty, and A. M. Salem, “Innovative method for enhancing key generation and management in the aes-algorithm,” CoRR, vol. abs/1504.03406, 2015.