M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 5, May 2015
Achieving Data Confidentiality and Authentication in Cloud Computing
Abhilash S Nath | Reshna T
Abstract: The Data sharing is one of the important property in cloud computing. Today our IT industry is developing huge amount of data. it is so difficult to store a large amount of data. Its also expensive and it-s not easy to secure those documents which are personal or confidential. Cloud computing is such a technology that help us to maintain this large amount of data in a distributed manner in a network. It-s a technology that is rapidly progressing in today-s world. The huge building for the servers are becoming imaginary when this technology came. But the security loop holes has given a impact to this technology. It-s not easy to handle a data in a unsecure channel. we need some data confidentiality and integrity in our systems. We must also take care the security also meet the expenses of the company in a desired wish. We want a more better encryption schemes used in cloud for data confidentiality one is such that using of a constant size aggregate key where release a constant-size aggregate key for required choices of ciphertext set in cloud s, but the other encrypted files which remain outside should be set confidential. In authentication where users authenticate using a two factor technology where password and a secret number play a role. This technology of using a password and a number for recovery and not lose of personal data for user for authentication even after a failure of Kerberos protocol. This gives user a trust and a thrust to cloud security
Keywords: Data confidentiality, Authentication, Key-aggregation, Encryption, Decryption
Edition: Volume 4 Issue 5, May 2015,
Pages: 1937 - 1942
How to Cite this Article?
Abhilash S Nath, Reshna T, "Achieving Data Confidentiality and Authentication in Cloud Computing", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=SUB154537, Volume 4 Issue 5, May 2015, 1937 - 1942, #ijsrnet
How to Share this Article?
Similar Articles with Keyword 'Data confidentiality'
A Survey on Deduplication Scheme in Cloud Storage
Deepa.D | Revathi.M 
Privacy Preserved Encrypted Cloud Data Access