Abstract

Cloud computing is a contemporary prototype to deliver services over the Internet. Cloud security is the most crucial issue in a cloud atmosphere either it is public cloud or community cloud. There is a vast scope to scrutinize data security enhancement in cloud storage. Authentication is anessential technology for information security, which is a mechanism to confirm proof of identities to obtain access of information in the system.Conventionally used authentication methods are rather securing data, but not smart enough and completely secured.In this paper, we have implemented a novel verification technique that associate with static username and password as a way in authentication followed by OTP based on the token generator method along with a digital signature and image captcha is an innovative factor to verify an each user. The solution aims at gaining confidentiality and integrity by making use of CP-ABHE (Ciphertext Policy-Attribute based Homomorphic Encryption algorithm) and user verification with Multi-Factor Authentication.Finally the efficiency of the system is examined with the help of the experimental results and discussions.

Highlights

  • In the developing technologies cloud computing placed a crucial role in various applications such as education, research, banking and other important sectors [1]

  • In this paper introduces the Ciphertext policy attribute [11] based homomorphic encryption algorithm along with the digital signature process

  • In this paper introduces the cipher text policy attribute based homomorphic encryption algorithm which ensures the security by using three different stages

Read more

Summary

INTRODUCTION

In the developing technologies cloud computing placed a crucial role in various applications such as education, research, banking and other important sectors [1]. Discusses about the proposed cipher text policy attribute based homomorphic encryption algorithm along with the digital signature process for ensuring the security while accessing services in cloud. The above figure 1 clearly depicted that the proposed cloud security architecture which consists of three stages of verification process namely normal user personal information encryption and decryption process, digital signature encryption process and image captcha verification. This three stage encryption process gives more security to user sensitive details eliminates intermediate attack with efficient manner. The detailed explanation of the proposed CP-ABE homomorphic cloud security process is explained as follows

Stage 1
Stage 3
Performance Analysis
CONCLUSION

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.