AUTHENTICATION & ISOLATION OF CRYPTOGRAPHIC SERVICES FOR CLOUD COMPUTING
Journal: International Journal OF Engineering Sciences & Management Research (Vol.3, No. 11)Publication Date: 2016-11-30
Authors : Madhavi Shyamsunder Shinde; Mirza Moiz Baig;
Page : 67-72
Keywords : ;
Abstract
Cloud computing is a virtual environment in which resources of the computing infrastructure are providedas data security and access control when users outsource sensitive data for sharing on cloud servers, which are notwithin the same trusted domain as data owners. To keep sensitive user data confidential against untrusted servers,existing solutions usually apply cryptographic methods by disclosing data decryption keys only to authorized users. If a cloud system is responsible for both tasks on storage and encryption/decryption of data, the system administrators may simultaneously obtain encrypted data and decryption keys. This allows them to access information without authorization and thus poses a risk to information privacy. This Project proposes a business model for cloud computing based on the concept of separating the encryption and decryption service from the storage service. An authentication method is proposed at a lower level which can be implemented by cloud providers. It is a simple way of authentication which can be utilized by developers along with encryption.
Other Latest Articles
- Software Project Risk Analysis using Intelligent Project metrics
- VISUAL CRYPTOGRAPHY AND STEGANOPGRAPHY: A REVIEW
- DIFFERENT SUBSTRATE LEVEL NOISE IN MIXED SIGNAL INTEGRATED CIRCUITS
- A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
- EFFECT OF WEAVE STRUCTURE ON COMFORT PROPERTIES OF MICROFIBER POLYESTER WOVEN FABRICS
Last modified: 2016-12-20 19:57:31