Secure Data Sharing with Confidentiality, Integrity and Access Control in Cloud Environment
نویسندگان
چکیده
Cloud storage is an incipient technology in today’s world. Lack of security cloud environment one the primary challenges faced these days. This scenario poses new issues and it forms crux current work. The study proposes Secure Interactional Proof System (SIPS) to address this challenge. methodology has a few key essential components listed herewith strengthen such as authentication, confidentiality, access control, integrity group AVK Scheme (Access List, Verifier Key Generator). It challenging for every user prove their identity verifier who maintains list. Verification conducted by following Gulliou-Quisquater protocol which determines level multi-step authentication process. Here, RSA algorithm performs generation process while proposed provides data well confidentiality using asymmetric encryption. Various methodological operations time consumption have been used performance evaluators SIPS protocol. solution secure system firm sharing with control. Stochastic Timed Petri (STPN) Net evaluation tool was verify formal analysis methodology. evidence established effectiveness environment.
منابع مشابه
Ensuring Security, Confidentiality and Fine-Grained Data Access Control of Cloud Data Storage Implementation Environment
With the development of cloud computing, the mutual understandability among distributed data access control has become an important issue in the security field of cloud computing. To ensure security, confidentiality and fine-grained data access control of Cloud Data Storage (CDS) environment, we proposed Multi-Agent System (MAS) architecture. This architecture consists of two agents: Cloud Serv...
متن کاملSecure authorization, access control and data integrity in Bluetooth
The Bluetooth standard has a provision for mutual authentication of connecting devices but not their actual users and allows access control during connection setup only. We propose a user authorization and pairing (UAP) application, that has the ability to perform authentication and authorization of users using role based model. The pairing procedure, which exchanges link key between devices, i...
متن کاملData Replication System in Secure Data Access control in Cloud Environment
Replication is a widely used method for achieving high availability in database systems. The data replication approach can be used for solutions such as Sharing data among remote offices, Sharing data among dispersed users, Make server data more accessible, Distribute solution updates, Back up data, Provide Internet or Intranet Replication. Cloud computing is most prevalent technology used in v...
متن کاملAchieving Secure cloud Data Sharing
Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that users’ data are usually processed remotely in unknown machines that users do not own or operate. While enjoying the convenience brought by this new emerging technology, users’ fears of losing control of their own data (particularly, financ...
متن کاملThe Research and Prospect of Secure Data Access Control in Cloud Storage Environment
—With the rapid development of cloud computing, users are becoming to move their data to the cloud server to avoid troublesome data management at local machines and enjoy convenient service, which might cause security and privacy protection issues of users’ data. To protect data security and user privacy, access control is an effective method. Generally, access control could be realized by cry...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer systems science and engineering
سال: 2022
ISSN: ['0267-6192']
DOI: https://doi.org/10.32604/csse.2022.019622