Enabling Indirect Mutual Trust and Secure Login Mechanism for Cloud Computing Storage Systems
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064


Amazon Sale


Research Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014

Enabling Indirect Mutual Trust and Secure Login Mechanism for Cloud Computing Storage Systems

Yasha Gawande, Shilpa Gite

In this era, management of huge amount of data is difficult on local machine. Hence many companies are outsourcing their data over remote cloud servers to lessen the storage load. But outsourcing huge amount of sensitive data to cloud servers is risk as cloud servers are untrusted. This work assist user to store data in the form of blocks. The outsourced data should be guaranteed with confidentiality, integrity and access control. In this paper, we propose a scheme which assures these security issues. Also the CSP, data owner and the users share untrust relation, hence trust between these parties is maintained by using a trusted third party (TTP) which has capability to detect and notify fraud party. This paper presents a scheme assuring access control by which data owner can grant or revoke access right to set of users. This cloud storage scheme uses concept of OTP to assert secure login at entry level. Current cloud scheme uses only login id and passwords but using OTP sent over email mitigates the chances of insecure login as OTP can be used only once.

Keywords: integrity, confidentiality, access control, mutual trust and OTP

Edition: Volume 3 Issue 12, December 2014

Pages: 173 - 177

Share this Article

How to Cite this Article?

Yasha Gawande, Shilpa Gite, "Enabling Indirect Mutual Trust and Secure Login Mechanism for Cloud Computing Storage Systems", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB14157, Volume 3 Issue 12, December 2014, 173 - 177

74 PDF Views | 53 PDF Downloads

Download Article PDF


Amazon Sale


Similar Articles with Keyword 'integrity'

Review Papers, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1251 - 1256

IT Auditing and its Standards

Dr D S Kushwaha, Ankur Singh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1981 - 1983

Advanced Security Mechanism in Wireless Sensor Network Using Watchdog and SAFEQ Mechanism

Gajendra Singh, Monali V. Ghode

Share this Article

Masters Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 130 - 134

Implementation of Client-Side Deduplication on Encrypted Data with Public Auditing in Cloud Storage

Lekhashree N R, Shashidhara M S, Santhosh S

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2648 - 2653

A Survey Framework on Energy Efficient and Secure Routing Protocol in WSN

Penumolu. Ratnakumari, M. Koteswara Rao

Share this Article

Similar Articles with Keyword 'confidentiality'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1525 - 1527

To Secure Query Services in the Cloud with RASP Data Perturbation

Puja Bhaganagarkar, Dhanshree Kulkarni

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2352 - 2357

RS and OFDM Methods Over Encrypted and Data Embedded Video Streams

Jithya J. Prakash, Hemand E. P.

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1882 - 1884

Catching Moles and Packet Droppers in Wireless Sensors Network

Mohammed Hajee, Mohammed Abdul Rawoof

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2784 - 2789

CAMP: Cloud Assisted Mobile Health Care System with Privacy

R. Abirami, Dr. S. T. Deepa

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1478 - 1481

A Secure Protocol for SMS Mobile Banking

Amol B. Jawanjal, R. B. Joshi

Share this Article

Similar Articles with Keyword 'access control'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 2060 - 2063

Envision Issue Inclined of an Application Exploiting Model-Based Integration and System Test Automation

Kiran V. Bakka, Aarti Deshpande

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1087 - 1088

A Survey on the Various Techniques of Data Leakage Detection

Saranya S. Devan, Minu Lalitha Madhavu

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2990 - 2992

A Review on an Improving Firewall Performance by Eliminating Redundancies in Access Control Lists (ACL)

Priyanka Padole, Purnima Selokar

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1752 - 1755

SNPDAC: Secure Network Protocol with Data Access Controlling in WSN

Uttarkar Amit Ratikant, Hingoliwala H. A.

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2461 - 2464

A Secure Approach for Privacy-Preserving in Information Brokering System using Query Forwarding

Madhuri D. Dhayarkar, Ram B. Joshi

Share this Article
Top