Deployment of Secure Sharing: Authenticity and Authorization using Cryptography in Cloud Environment

被引:0
|
作者
Upadhyaya, Akanksha [1 ]
Bansal, Monika [1 ]
机构
[1] Rukmini Devi Inst Adv Studies, Dept MCA, New Delhi, India
关键词
Asymmetric Cryptography; Economics of Scale; Scalability; Symmetric Cryptography; Cloud Computing;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is a cost-effective, scalable and flexible model of providing network services to a range of users including individual and business over the Internet. It has brought the revolution in the era of traditional method of storing and sharing of resources. It provides a variety of benefits to its users such as effective and efficient use of dynamically allocated shared resources, economics of scale, availability of resources etc. On the other part, cloud computing presents level of security risks because essential services are often controlled and handled by third party which makes it difficult to maintain data security and privacy and support data and service availability. Since cloud is a collection of machines called servers and all users' data stored on these machines, it emerges the security issues of confidentiality, integrity and availability. Authentication and authorization for data access on cloud is more than a necessity. Our work attempts to overcome these security challenges. The proposed methodology provides more control of owner on the data stored on cloud by restricting the access to specific user for specific file with limited privileges and for limited time period on the basis of secret key using symmetric as well as asymmetric mechanism. The integrity and confidentiality of data is ensured doubly by not only encrypting the secret key but also to the access permission and limited file information.
引用
收藏
页码:852 / 855
页数:4
相关论文
共 50 条
  • [41] Secure role activation and authorization in the enterprise environment
    Lui, RWC
    Hui, LCK
    Yiu, SM
    PUBLIC KEY INFRASTRUCTURE, 2005, 3545 : 22 - 35
  • [42] Design of Secure Storage for Health-care Cloud using Hybrid Cryptography
    Chinnasamy, P.
    Deepalakshmi, P.
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 1717 - 1720
  • [43] Secure and Light weight Data Sharing Scheme in Cyber Physical Cloud Environment
    Anagha, V
    Vijayanand, K. S.
    2022 IEEE INTERNATIONAL POWER AND RENEWABLE ENERGY CONFERENCE, IPRECON, 2022,
  • [44] A Secure Re-Encryption Scheme for Data Sharing in Unreliable Cloud Environment
    Sultan, Nazatul Haque
    Barbhuiya, Ferdous Ahmed
    PROCEEDINGS 2016 IEEE WORLD CONGRESS ON SERVICES - SERVICES 2016, 2016, : 75 - 80
  • [45] Cloud Secure Resource Sharing Algorithm from Object Based Sharable Environment
    Moghe, Uday
    Chaturvedi, Brajesh
    Lakkadwala, Prashant
    2015 4TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (ICRITO) (TRENDS AND FUTURE DIRECTIONS), 2015,
  • [46] SeGShare: Secure Group File Sharing in the Cloud using Enclaves
    Fuhry, Benny
    Hirschoff, Lina
    Koesnadi, Samuel
    Kerschbaum, Florian
    2020 50TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN 2020), 2020, : 476 - 488
  • [47] Secure Sharing of Mobile Device Data using Public Cloud
    Alam, Md Mozammil
    Hati, Sourav
    De, Debashis
    Chattopadhyay, Samiran
    2014 5TH INTERNATIONAL CONFERENCE CONFLUENCE THE NEXT GENERATION INFORMATION TECHNOLOGY SUMMIT (CONFLUENCE), 2014, : 149 - 154
  • [48] PKI-Based Cryptography for Secure Cloud Data Storage Using ECC
    Yin, XiaoChun
    Liu, ZengGuang
    Lee, Young Sil
    Lee, Hoon Jae
    2014 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2014, : 194 - 199
  • [49] Application of Personalized Cryptography in Cloud Environment
    Ogiela, Marek R.
    Ogiela, Lidia
    ADVANCES ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING, 2017, 1 : 253 - 257
  • [50] Development of trust-based authorization and authentication framework for secure electronic health payment in cloud environment
    Saranya, A.
    Naresh, R.
    Karuppiah, Santhi
    Jenifer, M.
    SOFT COMPUTING, 2024,