ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

AUTHENTICATION & ISOLATION OF CRYPTOGRAPHIC SERVICES FOR CLOUD COMPUTING

Journal: International Journal OF Engineering Sciences & Management Research (Vol.3, No. 11)

Publication Date:

Authors : ; ;

Page : 67-72

Keywords : ;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Cloud computing is a virtual environment in which resources of the computing infrastructure are providedas data security and access control when users outsource sensitive data for sharing on cloud servers, which are notwithin the same trusted domain as data owners. To keep sensitive user data confidential against untrusted servers,existing solutions usually apply cryptographic methods by disclosing data decryption keys only to authorized users. If a cloud system is responsible for both tasks on storage and encryption/decryption of data, the system administrators may simultaneously obtain encrypted data and decryption keys. This allows them to access information without authorization and thus poses a risk to information privacy. This Project proposes a business model for cloud computing based on the concept of separating the encryption and decryption service from the storage service. An authentication method is proposed at a lower level which can be implemented by cloud providers. It is a simple way of authentication which can be utilized by developers along with encryption.

Last modified: 2016-12-20 19:57:31