International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064




Downloads: 115

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 5, May 2015


Achieving Data Confidentiality and Authentication in Cloud Computing

Abhilash S Nath | Reshna T


Abstract: The Data sharing is one of the important property in cloud computing. Today our IT industry is developing huge amount of data. it is so difficult to store a large amount of data. Its also expensive and it-s not easy to secure those documents which are personal or confidential. Cloud computing is such a technology that help us to maintain this large amount of data in a distributed manner in a network. It-s a technology that is rapidly progressing in today-s world. The huge building for the servers are becoming imaginary when this technology came. But the security loop holes has given a impact to this technology. It-s not easy to handle a data in a unsecure channel. we need some data confidentiality and integrity in our systems. We must also take care the security also meet the expenses of the company in a desired wish. We want a more better encryption schemes used in cloud for data confidentiality one is such that using of a constant size aggregate key where release a constant-size aggregate key for required choices of ciphertext set in cloud s, but the other encrypted files which remain outside should be set confidential. In authentication where users authenticate using a two factor technology where password and a secret number play a role. This technology of using a password and a number for recovery and not lose of personal data for user for authentication even after a failure of Kerberos protocol. This gives user a trust and a thrust to cloud security


Keywords: Data confidentiality, Authentication, Key-aggregation, Encryption, Decryption


Edition: Volume 4 Issue 5, May 2015,


Pages: 1937 - 1942

Achieving Data Confidentiality and Authentication in Cloud Computing


How to Cite this Article?

Abhilash S Nath, Reshna T, "Achieving Data Confidentiality and Authentication in Cloud Computing", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=SUB154537, Volume 4 Issue 5, May 2015, 1937 - 1942, #ijsrnet

How to Share this Article?

Enter Your Email Address




Similar Articles with Keyword 'Data confidentiality'

Downloads: 101

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1812 - 1814

A Survey on Deduplication Scheme in Cloud Storage

Deepa.D | Revathi.M [3]

Share this Article

Downloads: 101

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2457 - 2460

Privacy Preserved Encrypted Cloud Data Access

Anes P. A. [2] | Neethu Francis [2]

Share this Article


Top