Implementation of Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing |
Author(s): |
Suvidha S Sangole , DBACER,Nagpur; Prof. M. R. Ingle, DBACER,Nagpur; Prof. Dinesh S. Gawande, DBACER,Ngpur |
Keywords: |
RSA, Pseudo–Random Number Key Generation, Privacy, Cloud Computing, Data Security, Authentication, Authorization |
Abstract |
Cloud computing has a lot of security crises that are acquirement great concentration nowadays, including the data shelter, network security. Data protection is one of the most important security crises that arise in real world, because associations won’t relocate its data to isolated machines if there is no definite data protection from the cloud service providers. Many procedures are suggested for data shelter in cloud computing, but there are still a lot of difficulties in this subject. The most popular security method includes SAPA i.e. “shared Authority based Privacy preserving Authentication Protocolâ€. Ambition of this paper is to investigate and estimate the most important security techniques for data sheltering in cloud computing. We have proposed SAPA, the shared access authority is achieved by unidentified access request and privacy contemplation, attribute based access control allows the single user to access own data. To provide the data invoking from the other trustworthy party and sharing among the multiple users proxy re-encryption scheme is used by the cloud server. It indicates that the proposed scenario is possibly applied for enhanced privacy-preservation and security in cloud applications. We have done the review study on this scenario. In this paper we will focused on implementation of this review with assuring a improved result. |
Other Details |
Paper ID: IJSRDV5I60081 Published in: Volume : 5, Issue : 6 Publication Date: 01/09/2017 Page(s): 109-112 |
Article Preview |
|
|