CRYPTOGRAPHIC SECURE CLOUD STORAGE MODEL WITH ANONYMOUS AUTHENTICATION AND AUTOMATIC FILE RECOVERY
We propose a secure cloud storage model that addresses security and storage issues for cloud computing environments. Security is achieved by anonymous authentication which ensures that cloud users remain anonymous while getting duly authenticated. For achieving this goal, we propose a digital signat...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
ICT Academy of Tamil Nadu
2014-10-01
|
Series: | ICTACT Journal on Soft Computing |
Subjects: | |
Online Access: | http://ictactjournals.in/paper/IJSC_Splissue_Oct2014_Paper_3_844_849.pdf |
id |
doaj-1c99acad6014465c8b124f992148fd7c |
---|---|
record_format |
Article |
spelling |
doaj-1c99acad6014465c8b124f992148fd7c2020-11-25T02:46:35ZengICT Academy of Tamil NaduICTACT Journal on Soft Computing0976-65612229-69562014-10-0151844849CRYPTOGRAPHIC SECURE CLOUD STORAGE MODEL WITH ANONYMOUS AUTHENTICATION AND AUTOMATIC FILE RECOVERYSowmiya Murthy0Department of Computer Science and Engineering, Sri Venkateswara College of Engineering, IndiaWe propose a secure cloud storage model that addresses security and storage issues for cloud computing environments. Security is achieved by anonymous authentication which ensures that cloud users remain anonymous while getting duly authenticated. For achieving this goal, we propose a digital signature based authentication scheme with a decentralized architecture for distributed key management with multiple Key Distribution Centers. Homomorphic encryption scheme using Paillier public key cryptosystem is used for encrypting the data that is stored in the cloud. We incorporate a query driven approach for validating the access policies defined by an individual user for his/her data i.e. the access is granted to a requester only if his credentials matches with the hidden access policy. Further, since data is vulnerable to losses or damages due to the vagaries of the network, we propose an automatic retrieval mechanism where lost data is recovered by data replication and file replacement with string matching algorithm. We describe a prototype implementation of our proposed model.http://ictactjournals.in/paper/IJSC_Splissue_Oct2014_Paper_3_844_849.pdfAccess PoliciesAnonymous AuthenticationDecentralized ArchitectureDistributed Key ManagementHomomorphic Encryption |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Sowmiya Murthy |
spellingShingle |
Sowmiya Murthy CRYPTOGRAPHIC SECURE CLOUD STORAGE MODEL WITH ANONYMOUS AUTHENTICATION AND AUTOMATIC FILE RECOVERY ICTACT Journal on Soft Computing Access Policies Anonymous Authentication Decentralized Architecture Distributed Key Management Homomorphic Encryption |
author_facet |
Sowmiya Murthy |
author_sort |
Sowmiya Murthy |
title |
CRYPTOGRAPHIC SECURE CLOUD STORAGE MODEL WITH ANONYMOUS AUTHENTICATION AND AUTOMATIC FILE RECOVERY |
title_short |
CRYPTOGRAPHIC SECURE CLOUD STORAGE MODEL WITH ANONYMOUS AUTHENTICATION AND AUTOMATIC FILE RECOVERY |
title_full |
CRYPTOGRAPHIC SECURE CLOUD STORAGE MODEL WITH ANONYMOUS AUTHENTICATION AND AUTOMATIC FILE RECOVERY |
title_fullStr |
CRYPTOGRAPHIC SECURE CLOUD STORAGE MODEL WITH ANONYMOUS AUTHENTICATION AND AUTOMATIC FILE RECOVERY |
title_full_unstemmed |
CRYPTOGRAPHIC SECURE CLOUD STORAGE MODEL WITH ANONYMOUS AUTHENTICATION AND AUTOMATIC FILE RECOVERY |
title_sort |
cryptographic secure cloud storage model with anonymous authentication and automatic file recovery |
publisher |
ICT Academy of Tamil Nadu |
series |
ICTACT Journal on Soft Computing |
issn |
0976-6561 2229-6956 |
publishDate |
2014-10-01 |
description |
We propose a secure cloud storage model that addresses security and storage issues for cloud computing environments. Security is achieved by anonymous authentication which ensures that cloud users remain anonymous while getting duly authenticated. For achieving this goal, we propose a digital signature based authentication scheme with a decentralized architecture for distributed key management with multiple Key Distribution Centers. Homomorphic encryption scheme using Paillier public key cryptosystem is used for encrypting the data that is stored in the cloud. We incorporate a query driven approach for validating the access policies defined by an individual user for his/her data i.e. the access is granted to a requester only if his credentials matches with the hidden access policy. Further, since data is vulnerable to losses or damages due to the vagaries of the network, we propose an automatic retrieval mechanism where lost data is recovered by data replication and file replacement with string matching algorithm. We describe a prototype implementation of our proposed model. |
topic |
Access Policies Anonymous Authentication Decentralized Architecture Distributed Key Management Homomorphic Encryption |
url |
http://ictactjournals.in/paper/IJSC_Splissue_Oct2014_Paper_3_844_849.pdf |
work_keys_str_mv |
AT sowmiyamurthy cryptographicsecurecloudstoragemodelwithanonymousauthenticationandautomaticfilerecovery |
_version_ |
1724757386120396800 |