Privacy - Preserving Public Authentication for Shared Data in Cloud

نویسندگان

  • Priyanka R Chaudhari
  • Archana C. Lomte
چکیده

Data security is an important in cloud. Access control is major issue to secure the stored data in cloud. Thus the proposing privacy preserving authenticated access control scheme for securing shared data in cloud. In the proposed scheme supports authenticated access control for anonymous user to share data on cloud also additional feature in access control which provides authentication for the user, in which only valid users are able to decrypt the stored information. User authentication and access control scheme are introduced in decentralized, which prevent replay attacks and also supports to creation, , and reading, modification data stored in the cloud. Implementation also provide feature user revocation.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Shared Data Based Privacy Preserving Authentication in Cloud for Public Auditing

With cloud data services, it is commonplace for data to be not only stored in the cloud, but also shared across multiple users. Unfortunately, the integrity of cloud data is subject to skepticism due to the existence of hardware/software failures and human errors. Several mechanisms have been designed to allow both data owners and public verifiers to efficiently audit cloud data integrity witho...

متن کامل

Privacy-Preserving Public Auditing Scheme for Shared Data with Supporting Multi-function

most common concerns for users in cloud storage are data integrity, confidentiality and availability, so various data integrity auditing schemes for cloud storage have been proposed in the past few years, some of which achieve privacy-preserving public auditing, data sharing and group dynamic, or support data dynamic. However, as far as we know, until now yet there doesn't exist a practical aud...

متن کامل

Privacy Preserving Public Auditing for Secured Data Storage in Cloud Using Block Authentication Code

Using cloud storage, users can remotely store their data, ondemand high-quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. Users no longer have physical possession of the outsourced data makes the data integrity protection in cloud computing for users with constrained computing resources. Users shou...

متن کامل

An Efficient Data Security Mechanism in Cloud Computing Using Anonymous ID Algorithm

Cloud computing has evolved from a risky and confusing concept to a strategy that organization large and small are beginning to adopt as part of their to overall computing strategy. Cloud computing is a method of providing a set of shared computing resources that includes application, computing, storage, netorking, development and deployment platforms as well as business processes.. Research on...

متن کامل

Comparative Study on Preserving Data Integrity for Shared Data in Cloud Storage

A novel privacy-preserving mechanism that supports public auditing for shared data stored on cloud. “Ring Signatures” is a technique to compute authentication metadata required to review the accuracy of shared data. This mechanism precise that the identity of the signer on each block in shared data is hidden from public verifiers, who are able to proficiently verify shared data integrity withou...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015