Secured data storage with users validation in cloud environment

被引:0
|
作者
Gangadharaiah N.K.C. [1 ]
Chinnasamy C. [2 ]
机构
[1] Bharathiar University, Coimbatore
[2] Govt. Arts College, Udumalpet, Tamilnadu
来源
Gangadharaiah, Naveen Kumar Chunganahalli (cgnaveenkumar11@gmail.com) | 2018年 / Lavoisier卷 / 23期
关键词
Cloud registering; Decryption; Encryption; Energy consumption; Energy reduction; Privacy; Security; Trusted authenticator (TA);
D O I
10.3166/ISI.23.6.61-72
中图分类号
学科分类号
摘要
Cloud computing is the idea actualized to break up the Daily Computing Problems. Cloud computing is essentially virtual pool of resources and it gives these resources to clients through web interface. Cloud computing is the web based improvement and utilized as a part of PC innovation. The common issue related with Cloud computing is information protection, security, obscurity and unwavering quality and so forth. The paper proposed a new authentication method for validating cloud users. The Paper proposed a new technique for energy consumption reduction in cloud centers so that efficient computing can be done An improved validation component for distinguishing client in cloud condition is likewise proposed. There are three fundamental parts engaged with this structure in particular Cloud User (CU), Trusted Authenticator (TA) and Cloud Service Providers (CSPs). The TA gives secure access to the client by creating the computerized mark. In this paper, the means for confirming the clients are additionally depicted and the power consumption is also reduced.s. © 2018 Lavoisier.
引用
收藏
页码:61 / 72
页数:11
相关论文
共 50 条
  • [21] Secured and High Performance Distributed Big Data Storage in Cloud Systems
    Hossain, Md Delwar
    Adnan, Muhammad Abdullah
    PROCEEDINGS OF 2018 3RD INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS), 2018, : 72 - 79
  • [22] Secured Document Sharing Using Visual Cryptography in Cloud Data Storage
    Brindha, K.
    Jeyanthi, N.
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2015, 15 (04) : 111 - 123
  • [23] Secured Privacy Data using Multi Key Encryption in Cloud Storage
    Reddy, Muthi P.
    Manjula, S. H.
    Venugopal, K. R.
    PROCEEDINGS OF 2018 FIFTH INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT), 2018,
  • [24] Data Access Control and Secured Data Sharing Approach for Health Care Data in Cloud Environment
    Pugazhenthi, A.
    Chitra, D.
    JOURNAL OF MEDICAL SYSTEMS, 2019, 43 (08)
  • [25] Division of data in cloud environment for secure data storage
    Manjula, S.
    Devi, M. Indra
    Swathiya, R.
    2016 INTERNATIONAL CONFERENCE ON COMPUTING TECHNOLOGIES AND INTELLIGENT DATA ENGINEERING (ICCTIDE'16), 2016,
  • [26] Data Access Control and Secured Data Sharing Approach for Health Care Data in Cloud Environment
    A. Pugazhenthi
    D. Chitra
    Journal of Medical Systems, 2019, 43
  • [27] Design of fully homomorphic multikey encryption scheme for secured cloud access and storage environment
    Salvakkam, Dilli Babu
    Pamula, Rajendra
    JOURNAL OF INTELLIGENT INFORMATION SYSTEMS, 2024, 62 (03) : 641 - 663
  • [28] Secured Data Storage and Computation Technique for Effective Utilization of Servers in Cloud Computing
    Tyagi, Manoj
    Manoria, Manish
    PROCEEDINGS OF FIRST INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS: VOL 1, 2016, 50 : 531 - 541
  • [29] Securing Cloud Storage by Remote Data Integrity Check with Secured Key Generation
    Abdul Rehman
    LIU Jian
    Muhammad Qasim Yasin
    LI Keqiu
    Chinese Journal of Electronics, 2021, 30 (03) : 489 - 499
  • [30] Efficient Multimedia Data Storage in Cloud Environment
    Deshpande, Prachi
    Sharma, S. C.
    Peddoju, Sateesh K.
    Abraham, Ajith
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2015, 39 (04): : 431 - 442