ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Novel Secure Data Storage with Unsigned Authentication in Cloud Computing used in Spread Access Control Framework

Journal: International Journal of Electrical, Electronics & Computer Science Engineering (Vol.4, No. 1)

Publication Date:

Authors : ;

Page : 01-05

Keywords : Decentralized Access; Access Control; Authentication of User; Cloud Storage; Privacy Preserving; Anonymous Authentication.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Cloud computing relies on sharing of resources to achieve coherence and economies of scale, similar to a utility (like the electricity grid) over a network. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. Much of the data stored in clouds is highly sensitive, for example, medical records and social networks. Security and privacy are, thus, very important issues in cloud computing. In one hand, the user should authenticate itself before initiating any trans- action, and on the other hand, it must be ensured that the cloud does not tamper with the data that is outsourced. User privacy is also required so that the cloud or other users do not know the identity of the user. In this paper, we propose the secure data storage in clouds for a new decentralized access. The cloud verifies the authenticity of the series without knowing the user's identity in the proposed scheme. Our feature is that only valid users can able to decrypt the stored information. It prevents from the replay attack. This scheme supports creation, modification, and reading the data stored in the cloud and also provide the decentralized authentication and robust. It can be com- parable to centralized schemes for the communication of data, computation of data, and storage of data.

Last modified: 2021-05-30 23:55:22