Secured data storage with users validation in cloud environment

被引:0
|
作者
Gangadharaiah N.K.C. [1 ]
Chinnasamy C. [2 ]
机构
[1] Bharathiar University, Coimbatore
[2] Govt. Arts College, Udumalpet, Tamilnadu
来源
Gangadharaiah, Naveen Kumar Chunganahalli (cgnaveenkumar11@gmail.com) | 2018年 / Lavoisier卷 / 23期
关键词
Cloud registering; Decryption; Encryption; Energy consumption; Energy reduction; Privacy; Security; Trusted authenticator (TA);
D O I
10.3166/ISI.23.6.61-72
中图分类号
学科分类号
摘要
Cloud computing is the idea actualized to break up the Daily Computing Problems. Cloud computing is essentially virtual pool of resources and it gives these resources to clients through web interface. Cloud computing is the web based improvement and utilized as a part of PC innovation. The common issue related with Cloud computing is information protection, security, obscurity and unwavering quality and so forth. The paper proposed a new authentication method for validating cloud users. The Paper proposed a new technique for energy consumption reduction in cloud centers so that efficient computing can be done An improved validation component for distinguishing client in cloud condition is likewise proposed. There are three fundamental parts engaged with this structure in particular Cloud User (CU), Trusted Authenticator (TA) and Cloud Service Providers (CSPs). The TA gives secure access to the client by creating the computerized mark. In this paper, the means for confirming the clients are additionally depicted and the power consumption is also reduced.s. © 2018 Lavoisier.
引用
收藏
页码:61 / 72
页数:11
相关论文
共 50 条
  • [31] Securing Public Data Storage in Cloud Environment
    Boopathy, D.
    Sundaresan, M.
    ICT AND CRITICAL INFRASTRUCTURE: PROCEEDINGS OF THE 48TH ANNUAL CONVENTION OF COMPUTER SOCIETY OF INDIA - VOL I, 2014, 248 : 555 - 562
  • [32] The Data Storage under Cloud Computing Environment
    Zhang, Lingxue
    Xiao, Yang
    2016 3RD INTERNATIONAL SYMPOSIUM ON ENGINEERING TECHNOLOGY, EDUCATION AND MANAGEMENT (ISETEM 2016), 2016, : 171 - 175
  • [33] Efficient multimedia data storage in cloud environment
    Deshpande, Prachi
    Sharma, S.C.
    Peddoju, Sateesh K.
    Abraham, Ajith
    Informatica (Slovenia), 2015, 39 (04): : 431 - 442
  • [34] Securing Cloud Storage by Remote Data Integrity Check with Secured Key Generation
    Rehman, Abdul
    Liu Jian
    Yasin, Muhammad Qasim
    Li Keqiu
    CHINESE JOURNAL OF ELECTRONICS, 2021, 30 (03) : 489 - 499
  • [35] A novel homomorphic RASD framework for secured data access and storage in cloud computing
    Jain, Rachna
    Nayyar, Anand
    OPEN COMPUTER SCIENCE, 2020, 10 (01): : 431 - 443
  • [36] Enhanced Convergent Encryption Key Generation for Secured Data Deduplication in Cloud Storage
    Uma, G.
    Jayasimman, L.
    SECOND NATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE (NCCI 2018), 2018, 1142
  • [37] Modified Secret Sharing Algorithm for Secured Medical Data Sharing in Cloud Environment
    Muthukumar, K. A.
    Nandhini, M.
    2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM), 2016, : 67 - 71
  • [38] A SECURED CLOUD STORAGE TECHNIQUE TO IMPROVE SECURITY IN CLOUD INFRASTRUCTURE
    SenthilKumar, M.
    Kumar, M.
    2013 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2013, : 97 - 102
  • [39] Lost in the Cloud: Cloud. Storage, Privacy, and Suggestions for Protecting Users' Data
    Johnson, Eric
    STANFORD LAW REVIEW, 2017, 69 (03) : 867 - 909
  • [40] ChainFS: Blockchain-Secured Cloud Storage
    Zou, Qiwu
    Tang, Yuzhe
    Chen, Ju
    Li, Kai
    Kamhoua, Charles A.
    Kwiat, Kevin
    Njilla, Laurent
    PROCEEDINGS 2018 IEEE 11TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2018, : 987 - 990