A Survey of Various Mutual Authentication Techniques in Cloud Computing Security

International Journal of Computer Science (IJCS Journal) Published by SK Research Group of Companies (SKRGC) Scholarly Peer Reviewed Research Journals

Format: Volume 3, Issue 2, No 2, 2015.

Copyright: All Rights Reserved ©2015

Year of Publication: 2015

Author: Miss. Richa Singh Dangi,Mr. Amit Saxena,Mr. Manish Manoria

Reference:IJCS-104

View PDF Format

Abstract

Modern technical move ahead have given increase to the recognition and accomplishment of cloud. This novel standard is ahead an increasing awareness, since it gives cost proficient designs that sustain the communication, storage space, and exhaustive computing of data. On the other hand, these shows potential storage space examines bring many difficult design concerns; significantly due to the failure of data organize. These confronts, explicitly data privacy and data reliability, have major control on the safety measures and concerts of the cloud structure. Some threat representations take for granted that the cloud service provider cannot be believed, and consequently security exclusives suggest a high level protection declaration, such as storing encrypted data in cloud servers. Additional assume that cloud providers can be confidences, and that probable threats come mainly from external attackers and additional malicious cloud users.

References

[1] S.S. Al-Riyami, K.G. Paterson, Certificateless Public Key Cryptography, In Asiacrypt 2003, LNCS 2894, pp 452-473, 2003. [2] Danan Thilakanathan, Shiping Chen, Surya Nepal and Rafael A, “Secure Data Sharing in the Cloud”, S. Nepal and M. Pathan (eds.), Security, Privacy and Trust in Cloud Systems, 45 DOI: 10.1007/978-3-642-38586-5_2, © Springer-Verlag Berlin Heidelberg 2014. [3] S. Jahid, P. Mittal, and N. Borisov, \EASiER: encryption-based access control in social networks with efficient revocation,” in Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ser. ASIACCS ’11. NewYork, NY, USA: ACM, 2011, pp. 411-415. [4] S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable, and fine-grained data access control in cloud computing,” in Proceedings of the 29th conference on Information communications, ser. INFOCOM’10. Piscataway, NJ, USA: IEEE Press, 2010, pp. 534-542. [5] Seung-Hyun Seo, Mohamed Nabeel, Xiaoyu Ding and Elisa Bertino “An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds” IEEE Transactions On Knowledge And Data Engineering, Vol. 26, No. 9, September 2014. [6] M. Myers, R. Ankney, A. Alpani, S. Galperin, C. Adams, X.509 Internet Public Key Infrastructure: Online Certificate Status Protocol (OCSP), RFC 2560. [7] Ruhr “Cloud computing: Gaps in the cloud”. NewsRx Health Sci. (2011). [8] S. Jarecki, C. S. Jutla, H. Krawczyk, M. Rosu, and M. Steiner. Outsourced symmetric private information retrieval. In CCS’13, Berlin, Germany, 2013, pages 875–888, 2013. [9] Lei Xu, Xiaoxin Wu, Xinwen Zhang, “CL-PRE: a Certificateless Proxy Re-Encryption Scheme for Secure Data Sharing with Public Cloud” ASIACCS ’12, May 2–4, 2012, Seoul, Korea. [10] Tu S, Niu S, Li H, Xiao-ming Y, Li M, “Fine-grained access control and revocation for sharing data on clouds,” IEEE 26th international parallel and distributed processing symposium workshops and PhD forum (IPDPSW) 2012, pp 2146–2155. [11] Ning Cao, Cong Wang, Ming Li, Kui Ren and Wenjing Lou “Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data” IEEE Transactions On Parallel And Distributed Systems, Vol. 25, No. 1, January 2014. [12] X. W. Lei Xu and X. Zhang, “CL-PKE: A certificateless proxy re-encryption scheme for secure data sharing with public cloud,” in ACM Symp. Inform. Comput. Commun. Security, 2012. [13] L. Shen, F. Zhang, Y. Sun, Efficient Revocable Certificate-less Encryption Secure in the Standard Model, The Computer Journal (2013) doi: 10.1093/comjnl/bxt040. First published online: April 30, 2013. [14] C.-I. Fan, P.-H. Ho, J.-J. Huan and Y.-F. Tseng, “Secure Certificateless Signature Scheme Supporting Batch Verification.” In AsiaJCIS, 2013, pp. 8–11.


Keywords

Public key, Cloud Computing, Public Key Encryption, Attacks, Data Sharing.

This work is licensed under a Creative Commons Attribution 3.0 Unported License.   

TOP
Facebook IconYouTube IconTwitter IconVisit Our Blog