Multi User Authentication in Reliable Data Storage in Cloud

被引:0
|
作者
Yakoob, Sk [1 ]
Reddy, V. Krishna [1 ]
Dastagiraiah, C. [1 ]
机构
[1] KL Univ, Dept CSE, Vijayawada, India
关键词
Cloud computing; BGKM; Secure multi key word search; Quality based encryption; SEARCH;
D O I
10.1007/978-981-10-3226-4_54
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Information out sourcing is the fundamental centering term in distributed computing. More information proprietors accomplishes in outsource their information into cloud servers. In any case, touchy data ought to be secured before outsourcing for protection necessities, which obsoletes data utilization like catchphrase based papers recuperation. A safe multi-catchphrase evaluated seek arrangement over secured thinking information, which in the meantime encourages intense update capacities like expulsion and position of records. In particular, the vector space outline and the broadly utilized TF-IDF configuration are blended in the list development and inquiry. But the ability of searching encryption is main challenge in secure multi keyword search with user activities of deletion, revoking of users with multiple user access control in cloud computing. In this paper we propose to BGKM (Broadcast Group Key Management) schema for multi user access control in user activities like data insertion, deletion and in user revocation in real time cloud application development. We evaluate the security of our BGKM plan and evaluate it with the current BGKM techniques which are mostly used for data accessing in real time cloud computing for achieving real time applications in cloud. Our experimental results show efficient data extraction from multi user access in searching of data from cloud servers.
引用
收藏
页码:531 / 539
页数:9
相关论文
共 50 条
  • [41] A Lightweight Multi-User Authentication Scheme based on Cellular Automata in Cloud Environment
    Shin, Sang-Ho
    Kim, Dong-Hyun
    Yoo, Kee-Young
    [J]. 2012 IEEE 1ST INTERNATIONAL CONFERENCE ON CLOUD NETWORKING (CLOUDNET), 2012,
  • [42] Efficient encrypted image retrieval in IoT-cloud with multi-user authentication
    Al Sibahee, Mustafa A.
    Lu, Songfeng
    Abduljabbar, Zaid Ameen
    Ibrahim, Ayad
    Hussien, Zaid Alaa
    Mutlaq, Keyan Abdul-Aziz
    Hussain, Mohammed Abdulridha
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2018, 14 (02):
  • [43] Multi-User Verifiable Searchable Symmetric Encryption for Cloud Storage
    Liu, Xueqiao
    Yang, Guomin
    Mu, Yi
    Deng, Robert H.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (06) : 1322 - 1332
  • [44] Implementation of User Authentication as a Service for Cloud Network
    Shah, Masood
    Shah, Abdul Sala
    Ijaz, Imran
    [J]. INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2016, 9 (10): : 197 - 209
  • [45] Research on authentication of user information in cloud manufacturing
    Xie, Xiaolan
    Zhou, Xiao
    Liu, Yarong
    [J]. Recent Patents on Engineering, 2019, 13 (04) : 410 - 415
  • [46] Mobile user authentication system in cloud environment
    Yeh, Her-Tyan
    Chen, Bing-Chang
    Wu, Yi-Cong
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (09) : 1161 - 1168
  • [47] An Improvement of User Authentication Framework for Cloud Computing
    Mun, Jongho
    Kim, Jiye
    Won, Dongho
    [J]. JOURNAL OF COMPUTERS, 2016, 11 (06) : 446 - 454
  • [48] Expressive Data Storage Policies for Multi-cloud Storage Configurations
    Rafique, Ansar
    Van Landuyt, Dimitri
    Joosen, Wouter
    [J]. 2015 17TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING (SYNASC), 2016, : 329 - 336
  • [49] Key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage
    Guo, Cheng
    Luo, Ningqi
    Bhuiyan, Md Zakirul Alam
    Jie, Yingmo
    Chen, Yuanfang
    Feng, Bin
    Alam, Muhammad
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 84 : 190 - 199
  • [50] A Lightweight and Efficient Remote Data Authentication Protocol Over Cloud Storage Environment
    Ghaffar, Zahid
    Shamshad, Salman
    Mahmood, Khalid
    Obaidat, Mohammad S.
    Kumari, Saru
    Khan, Muhammad Khurram
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2023, 10 (01): : 103 - 112