Abstract

Cloud Computing is a framework where services are provided to the clients on pay per use basis. Many of the organizations uses cloud servers for outsourcing their sensitive data. Along with all the advantages of cloud computing there comes a threat of security of sensitive outsourced data. Cloud users cannot rely only on cloud service provider for the security reasons of the outsourced data. On that account there is need of Third Party Authenticator who will authenticate the cloud data on behalf of data owners. This paper proposes two schemes in order to ensure the security of the data stored on cloud. First one is Public Auditing in which homomorphic linear authenticator with random masking is used for auditing process. The second scheme is of Threshold Cryptography in which Capability List is used to ensure the data access control. Our first scheme ensures that TPA will not gain any knowledge about the sensitive data during auditing process. Our second scheme guarantee that malicious users could not misuse the data stored on clouds.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call