• DocumentCode
    3254458
  • Title

    Deployment of secure sharing: Authenticity and authorization using cryptography in cloud environment

  • Author

    Upadhyaya, Akanksha ; Bansal, Monika

  • Author_Institution
    Dept. of MCA, Rukmini Devi Inst. of Adv. Studies, New Delhi, India
  • fYear
    2015
  • fDate
    19-20 March 2015
  • Firstpage
    852
  • Lastpage
    855
  • Abstract
    Cloud computing is a cost-effective, scalable and flexible model of providing network services to a range of users including individual and business over the Internet. It has brought the revolution in the era of traditional method of storing and sharing of resources. It provides a variety of benefits to its users such as effective and efficient use of dynamically allocated shared resources, economics of scale, availability of resources etc. On the other part, cloud computing presents level of security risks because essential services are often controlled and handled by third party which makes it difficult to maintain data security and privacy and support data and service availability. Since cloud is a collection of machines called servers and all users´ data stored on these machines, it emerges the security issues of confidentiality, integrity and availability. Authentication and authorization for data access on cloud is more than a necessity. Our work attempts to overcome these security challenges. The proposed methodology provides more control of owner on the data stored on cloud by restricting the access to specific user for specific file with limited privileges and for limited time period on the basis of secret key using symmetric as well as asymmetric mechanism. The integrity and confidentiality of data is ensured doubly by not only encrypting the secret key but also to the access permission and limited file information.
  • Keywords
    authorisation; cloud computing; commerce; cryptography; economies of scale; information retrieval; Internet; authenticity; authorization; availability of resources; business; cloud computing; cloud environment; cryptography; data access; dynamically allocated shared resources; economics of scale; network services; secure sharing; Authorization; Cloud computing; Computational modeling; Computers; Cryptography; Servers; Asymmetric Cryptography; Cloud Computing; Economics of Scale; Scalability; Symmetric Cryptography;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Engineering and Applications (ICACEA), 2015 International Conference on Advances in
  • Conference_Location
    Ghaziabad
  • Type

    conf

  • DOI
    10.1109/ICACEA.2015.7164823
  • Filename
    7164823