Research Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014
Enabling Indirect Mutual Trust and Secure Login Mechanism for Cloud Computing Storage Systems
Yasha Gawande, Shilpa Gite
In this era, management of huge amount of data is difficult on local machine. Hence many companies are outsourcing their data over remote cloud servers to lessen the storage load. But outsourcing huge amount of sensitive data to cloud servers is risk as cloud servers are untrusted. This work assist user to store data in the form of blocks. The outsourced data should be guaranteed with confidentiality, integrity and access control. In this paper, we propose a scheme which assures these security issues. Also the CSP, data owner and the users share untrust relation, hence trust between these parties is maintained by using a trusted third party (TTP) which has capability to detect and notify fraud party. This paper presents a scheme assuring access control by which data owner can grant or revoke access right to set of users. This cloud storage scheme uses concept of OTP to assert secure login at entry level. Current cloud scheme uses only login id and passwords but using OTP sent over email mitigates the chances of insecure login as OTP can be used only once.
Keywords: integrity, confidentiality, access control, mutual trust and OTP
Edition: Volume 3 Issue 12, December 2014
Pages: 173 - 177
How to Cite this Article?
Yasha Gawande, Shilpa Gite, "Enabling Indirect Mutual Trust and Secure Login Mechanism for Cloud Computing Storage Systems", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB14157, Volume 3 Issue 12, December 2014, 173 - 177
74 PDF Views | 53 PDF Downloads
Similar Articles with Keyword 'integrity'
IT Auditing and its Standards
Dr D S Kushwaha, Ankur Singh
Efficient and Secure Auditing of Cloud Data with Key -Updating
Niranjana S, Manjusha M S
Advanced Security Mechanism in Wireless Sensor Network Using Watchdog and SAFEQ Mechanism
Gajendra Singh, Monali V. Ghode
Implementation of Client-Side Deduplication on Encrypted Data with Public Auditing in Cloud Storage
Lekhashree N R, Shashidhara M S, Santhosh S
A Survey Framework on Energy Efficient and Secure Routing Protocol in WSN
Penumolu. Ratnakumari, M. Koteswara Rao
Similar Articles with Keyword 'confidentiality'
To Secure Query Services in the Cloud with RASP Data Perturbation
Puja Bhaganagarkar, Dhanshree Kulkarni
RS and OFDM Methods Over Encrypted and Data Embedded Video Streams
Jithya J. Prakash, Hemand E. P.
Catching Moles and Packet Droppers in Wireless Sensors Network
Mohammed Hajee, Mohammed Abdul Rawoof
CAMP: Cloud Assisted Mobile Health Care System with Privacy
R. Abirami, Dr. S. T. Deepa
A Secure Protocol for SMS Mobile Banking
Amol B. Jawanjal, R. B. Joshi
Similar Articles with Keyword 'access control'
Envision Issue Inclined of an Application Exploiting Model-Based Integration and System Test Automation
Kiran V. Bakka, Aarti Deshpande
A Survey on the Various Techniques of Data Leakage Detection
Saranya S. Devan, Minu Lalitha Madhavu
A Review on an Improving Firewall Performance by Eliminating Redundancies in Access Control Lists (ACL)
Priyanka Padole, Purnima Selokar
SNPDAC: Secure Network Protocol with Data Access Controlling in WSN
Uttarkar Amit Ratikant, Hingoliwala H. A.
A Secure Approach for Privacy-Preserving in Information Brokering System using Query Forwarding
Madhuri D. Dhayarkar, Ram B. Joshi