International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 115

India | Computer Science Engineering | Volume 4 Issue 5, May 2015 | Pages: 1937 - 1942


Achieving Data Confidentiality and Authentication in Cloud Computing

Abhilash S Nath, Reshna T

Abstract: The Data sharing is one of the important property in cloud computing. Today our IT industry is developing huge amount of data. it is so difficult to store a large amount of data. Its also expensive and it-s not easy to secure those documents which are personal or confidential. Cloud computing is such a technology that help us to maintain this large amount of data in a distributed manner in a network. It-s a technology that is rapidly progressing in today-s world. The huge building for the servers are becoming imaginary when this technology came. But the security loop holes has given a impact to this technology. It-s not easy to handle a data in a unsecure channel. we need some data confidentiality and integrity in our systems. We must also take care the security also meet the expenses of the company in a desired wish. We want a more better encryption schemes used in cloud for data confidentiality one is such that using of a constant size aggregate key where release a constant-size aggregate key for required choices of ciphertext set in cloud s, but the other encrypted files which remain outside should be set confidential. In authentication where users authenticate using a two factor technology where password and a secret number play a role. This technology of using a password and a number for recovery and not lose of personal data for user for authentication even after a failure of Kerberos protocol. This gives user a trust and a thrust to cloud security

Keywords: Data confidentiality, Authentication, Key-aggregation, Encryption, Decryption

How to Cite?: Abhilash S Nath, Reshna T, "Achieving Data Confidentiality and Authentication in Cloud Computing", Volume 4 Issue 5, May 2015, International Journal of Science and Research (IJSR), Pages: 1937-1942, https://www.ijsr.net/getabstract.php?paperid=SUB154537, DOI: https://dx.doi.org/10.21275/SUB154537


Download Article PDF


Rate This Article!


Top