Secured data storage with users validation in cloud environment

被引:0
作者
Gangadharaiah N.K.C. [1 ]
Chinnasamy C. [2 ]
机构
[1] Bharathiar University, Coimbatore
[2] Govt. Arts College, Udumalpet, Tamilnadu
来源
Gangadharaiah, Naveen Kumar Chunganahalli (cgnaveenkumar11@gmail.com) | 2018年 / Lavoisier卷 / 23期
关键词
Cloud registering; Decryption; Encryption; Energy consumption; Energy reduction; Privacy; Security; Trusted authenticator (TA);
D O I
10.3166/ISI.23.6.61-72
中图分类号
学科分类号
摘要
Cloud computing is the idea actualized to break up the Daily Computing Problems. Cloud computing is essentially virtual pool of resources and it gives these resources to clients through web interface. Cloud computing is the web based improvement and utilized as a part of PC innovation. The common issue related with Cloud computing is information protection, security, obscurity and unwavering quality and so forth. The paper proposed a new authentication method for validating cloud users. The Paper proposed a new technique for energy consumption reduction in cloud centers so that efficient computing can be done An improved validation component for distinguishing client in cloud condition is likewise proposed. There are three fundamental parts engaged with this structure in particular Cloud User (CU), Trusted Authenticator (TA) and Cloud Service Providers (CSPs). The TA gives secure access to the client by creating the computerized mark. In this paper, the means for confirming the clients are additionally depicted and the power consumption is also reduced.s. © 2018 Lavoisier.
引用
收藏
页码:61 / 72
页数:11
相关论文
共 20 条
  • [1] Abdul D.S., Elminaam H.M., Kader A., Hadhoud M.M., Performance evaluation of symmetric encryption algorithms, International Conference on Parallel, Distributed and Grid Computing, 8, pp. 58-64, (2009)
  • [2] Arora P., Singh A., Tyagi H., Evaluation and comparison of security issues on cloud computing environment, World of Computer Science and Information Technology Journal, 2, 5, pp. 179-183, (2012)
  • [3] Bhisikar P., Sahu A., Security in data storage and transmission in cloud compituing, International Journal of Advanced Research in Cloud Science and Software Engineering, 3, 3, pp. 410-415, (2013)
  • [4] Chandramohan D., Vengattaraman T., Rajaguru D., Ramachandran B., Dhavachelvan P., A privacy breach preventing and mitigation methodology for cloud serv ice data storage, IEEE International Advanced Computing Conference, (2013)
  • [5] Fanfara P., Dankova E., Dufala M., Usage of asymmetric encryption algorithms to enhance the security of sensitive data in secure communication, IEEE 10th Jubilee International Symposium on Applied Machine Intelligence and Informatics, pp. 213-217, (2012)
  • [6] Gampala V., Inuganti S., Muppidi S., Data security in cloud computing with elliptic curve cryptography, International Journal of Soft Computing and Engineering, 2, pp. 138-141, (2012)
  • [7] Gupta S., Satapathy S.R., Mehta P., Tripathy A., A secure and searchable data storage in cloud computing, IEEE International Advance Computing Conference, pp. 106-109, (2012)
  • [8] Harjani D., Jethwani M., Keswaney N., Jacob S., Automated parking management system using license plate recognition, Int. J. Computer Technology & Applications, 4, 5, pp. 741-745, (2013)
  • [9] Hirani S., Energy Consumption of Encryption Schemes in Wireless Devices Thesis, (2003)
  • [10] Jadeja Y., Modi K., Cloud co mputing - Concepts, architecture and challenges, 012 International Conference on Computing, Electronics and Electrical Technologies, pp. 877-879, (2012)