International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014

Enabling Indirect Mutual Trust and Secure Login Mechanism for Cloud Computing Storage Systems

Yasha Gawande, Shilpa Gite

In this era, management of huge amount of data is difficult on local machine. Hence many companies are outsourcing their data over remote cloud servers to lessen the storage load. But outsourcing huge amount of sensitive data to cloud servers is risk as cloud servers are untrusted. This work assist user to store data in the form of blocks. The outsourced data should be guaranteed with confidentiality, integrity and access control. In this paper, we propose a scheme which assures these security issues. Also the CSP, data owner and the users share untrust relation, hence trust between these parties is maintained by using a trusted third party (TTP) which has capability to detect and notify fraud party. This paper presents a scheme assuring access control by which data owner can grant or revoke access right to set of users. This cloud storage scheme uses concept of OTP to assert secure login at entry level. Current cloud scheme uses only login id and passwords but using OTP sent over email mitigates the chances of insecure login as OTP can be used only once.

Keywords: integrity, confidentiality, access control, mutual trust and OTP

Edition: Volume 3 Issue 12, December 2014

Pages: 173 - 177


How to Cite this Article?

Yasha Gawande, Shilpa Gite, "Enabling Indirect Mutual Trust and Secure Login Mechanism for Cloud Computing Storage Systems", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB14157, Volume 3 Issue 12, December 2014, 173 - 177

25 PDF Views | 17 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'integrity'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1450 - 1453

Multi-Cloud Data Storing Strategy with Cost Efficiency and High Availability

Shilpa B Kodli, Pramila D Reshmi

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1698 - 1704

Maintenance of User Query Integrity and Voronoi Neighbors Using Multiple Signers in Signature Aggregation

V. Maruvoor Arasi, Carolene

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1285 - 1288

Integrity Attestation for Software-as-a Service Clouds

Chashu Mol R, Alfia A P

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 2011 - 2014

Attack Detection and Mitigation for AGC

Pooja A Kulkarni, Harshal A Karande

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3099 - 3106

Separable Reversible Data Hiding In Encrypted Image Using Modified Least Significant Bit and Virtual Embedding

Shreya M. S., Sandeep Kumar S

Share this article

Similar Articles with Keyword 'confidentiality'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3099 - 3106

Separable Reversible Data Hiding In Encrypted Image Using Modified Least Significant Bit and Virtual Embedding

Shreya M. S., Sandeep Kumar S

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1640 - 1647

Privacy Preservation Protection for Personalized Web User by k-Anonymity with Profile Construction for Web Search Engines

Uma Maheswari.T, Dr.V. Kavitha

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 988 - 992

A Survey on Attribute Based Encryption to Improve Efficiency in Semantic Search Over Cloud Data

Vina M. Lomte, Gauri S. Patil

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1728 - 1730

A Trusted Framework for Data Security in Cloud Environment

Mannem Sindhuja, Punugoti Pavan Kumar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1731 - 1735

Concurrent and Free Accessing in Encrypted Cloud Databases

G. Sudheer Kumar, P. Pavan Kumar

Share this article

Similar Articles with Keyword 'access control'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1973 - 1976

Survey on: Fade Architecture for Secured Access and Assured Deletion in Cloud Storage

Nilam Musale, Vilas Gaikwad

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 988 - 992

A Survey on Attribute Based Encryption to Improve Efficiency in Semantic Search Over Cloud Data

Vina M. Lomte, Gauri S. Patil

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1454 - 1457

A Reliable Method for Accuracy Constrained Privacy Preservation for Relational Data

Waghmare Ashwini R, V. M. Jarali

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1398 - 1401

A Review on Encryption Techniques to Secure a Cloud

Ramandeep Kaur, Ashish Verma

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2347 - 2349

A Survey on Security and Accuracy Constrained Privacy Preserving Task Based Access Control Mechanism for Relational Data

Pratik Bhingardeve, D. H. Kulkarni

Share this article

Top