High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

Implementation of Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing


Suvidha S Sangole , DBACER,Nagpur; Prof. M. R. Ingle, DBACER,Nagpur; Prof. Dinesh S. Gawande, DBACER,Ngpur


RSA, Pseudo–Random Number Key Generation, Privacy, Cloud Computing, Data Security, Authentication, Authorization


Cloud computing has a lot of security crises that are acquirement great concentration nowadays, including the data shelter, network security. Data protection is one of the most important security crises that arise in real world, because associations won’t relocate its data to isolated machines if there is no definite data protection from the cloud service providers. Many procedures are suggested for data shelter in cloud computing, but there are still a lot of difficulties in this subject. The most popular security method includes SAPA i.e. “shared Authority based Privacy preserving Authentication Protocol”. Ambition of this paper is to investigate and estimate the most important security techniques for data sheltering in cloud computing. We have proposed SAPA, the shared access authority is achieved by unidentified access request and privacy contemplation, attribute based access control allows the single user to access own data. To provide the data invoking from the other trustworthy party and sharing among the multiple users proxy re-encryption scheme is used by the cloud server. It indicates that the proposed scenario is possibly applied for enhanced privacy-preservation and security in cloud applications. We have done the review study on this scenario. In this paper we will focused on implementation of this review with assuring a improved result.

Other Details

Paper ID: IJSRDV5I60081
Published in: Volume : 5, Issue : 6
Publication Date: 01/09/2017
Page(s): 109-112

Article Preview

Download Article