ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Achieving Data Confidentiality and Authentication in Cloud Computing

Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 5)

Publication Date:

Authors : ; ;

Page : 1937-1942

Keywords : Data confidentiality; Authentication; Key-aggregation; Encryption; Decryption;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

The Data sharing is one of the important property in cloud computing. Today our IT industry is developing huge amount of data. it is so difficult to store a large amount of data. Its also expensive and it-s not easy to secure those documents which are personal or confidential. Cloud computing is such a technology that help us to maintain this large amount of data in a distributed manner in a network. It-s a technology that is rapidly progressing in today-s world. The huge building for the servers are becoming imaginary when this technology came. But the security loop holes has given a impact to this technology. It-s not easy to handle a data in a unsecure channel. we need some data confidentiality and integrity in our systems. We must also take care the security also meet the expenses of the company in a desired wish. We want a more better encryption schemes used in cloud for data confidentiality one is such that using of a constant size aggregate key where release a constant-size aggregate key for required choices of ciphertext set in cloud s, but the other encrypted files which remain outside should be set confidential. In authentication where users authenticate using a two factor technology where password and a secret number play a role. This technology of using a password and a number for recovery and not lose of personal data for user for authentication even after a failure of Kerberos protocol. This gives user a trust and a thrust to cloud security

Last modified: 2021-06-30 21:46:31