Deployment of Secure Sharing: Authenticity and Authorization using Cryptography in Cloud Environment

被引:0
|
作者
Upadhyaya, Akanksha [1 ]
Bansal, Monika [1 ]
机构
[1] Rukmini Devi Inst Adv Studies, Dept MCA, New Delhi, India
关键词
Asymmetric Cryptography; Economics of Scale; Scalability; Symmetric Cryptography; Cloud Computing;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is a cost-effective, scalable and flexible model of providing network services to a range of users including individual and business over the Internet. It has brought the revolution in the era of traditional method of storing and sharing of resources. It provides a variety of benefits to its users such as effective and efficient use of dynamically allocated shared resources, economics of scale, availability of resources etc. On the other part, cloud computing presents level of security risks because essential services are often controlled and handled by third party which makes it difficult to maintain data security and privacy and support data and service availability. Since cloud is a collection of machines called servers and all users' data stored on these machines, it emerges the security issues of confidentiality, integrity and availability. Authentication and authorization for data access on cloud is more than a necessity. Our work attempts to overcome these security challenges. The proposed methodology provides more control of owner on the data stored on cloud by restricting the access to specific user for specific file with limited privileges and for limited time period on the basis of secret key using symmetric as well as asymmetric mechanism. The integrity and confidentiality of data is ensured doubly by not only encrypting the secret key but also to the access permission and limited file information.
引用
收藏
页码:852 / 855
页数:4
相关论文
共 50 条
  • [21] An efficient and secure data sharing scheme for cloud data using hash based quadraplet wavelet permuted cryptography approach
    Lakshmanan, Selvam
    Manimozhi, Braveen
    Ramachandran, Venkatesan
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (27):
  • [22] Efficient Functional Encryption and Proxy Re-cryptography for Secure Public Cloud Data Sharing
    Abdallal, Hisham
    Xiong Hu
    Wahaballa, Abubaker
    Eltayieb, Nabeil
    Ramadan, Mohammed
    Qin Zhiguang
    2016 IEEE INTERNATIONAL CONFERENCE OF ONLINE ANALYSIS AND COMPUTING SCIENCE (ICOACS), 2016, : 367 - 370
  • [23] A novel and provably secure mutual authentication protocol for cloud environment using elliptic curve cryptography and fuzzy verifier
    Patel, Khushboo A.
    Shukla, Shivangi
    Patel, Sankita J.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (02):
  • [24] Secure File Sharing Using Cryptographic Techniques in Cloud
    Malarvizhi, M.
    Sujana, J. Angela Jennifa
    Revathi, T.
    2014 INTERNATIONAL CONFERENCE ON GREEN COMPUTING COMMUNICATION AND ELECTRICAL ENGINEERING (ICGCCEE), 2014,
  • [25] Secure Data Sharing with Confidentiality, Integrity and Access Control in Cloud Environment
    Rajkumar, V
    Prakash, M.
    Vennila, V.
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 40 (02): : 779 - 793
  • [26] ECC Based Secure Sharing of Healthcare Data in the Health Cloud Environment
    Hema, V. Sri Vigna
    Kesavan, Ramesh
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 108 (02) : 1021 - 1035
  • [27] ECC Based Secure Sharing of Healthcare Data in the Health Cloud Environment
    V. Sri Vigna Hema
    Ramesh Kesavan
    Wireless Personal Communications, 2019, 108 : 1021 - 1035
  • [28] Blockchain broadcast proxy ReEncryption in cloud environment for secure data sharing
    Pillai, Beena G.
    Dayanand, N. Lal
    Prasanna, T. Venkatesh
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2024, 49 (02):
  • [29] Secure data sharing with confidentiality, integrity and access control in cloud environment
    Rajkumar V.
    Prakash M.
    Vennila V.
    Computer Systems Science and Engineering, 2021, 40 (02): : 779 - 793
  • [30] HESSIS: Hybrid Encryption Scheme for Secure Image Sharing in a Cloud Environment
    Kaur, Jaspreet
    Sharma, Sumit
    ADVANCED INFORMATICS FOR COMPUTING RESEARCH, PT II, 2019, 956 : 204 - 216