High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

A Brief Survey on the Security Model of Cloud Computing with Semi Trusted Third Party

Author(s):

Sherin Shaju , Cochin College of Engineering and Technology; Shabna M, Cochin College of Engineering and Technology

Keywords:

Cloud Computing, High Level Petri Nets (HLPN), Satisfiability Modulo Theory (SMT), Scyther, Cloud Computing

Abstract

The emerging trends of cloud environment in the field of distributed computing, data security are a huge concern for most of the cloud users. In a cloud environment anyone can access the data, over the internet, therefore the authentication and access control are main issues to secure the data. Trusted third parties are the independent service providers who facilitate secure transmission of data between two parties. The Integrity of data should be ensured by trusted third parties. In this paper, the security is provided for the cloud environment with a semi trusted party which provides a) access control Mechanism b) Key Management c) Policy File Encryption d) Policy Revocation and e) Policy renewal. The results reveal that combined key algorithms can be effectively used for security of outsourced data by engaging key management and access control.

Other Details

Paper ID: IJSRDV7I20077
Published in: Volume : 7, Issue : 2
Publication Date: 01/05/2019
Page(s): 92-96

Article Preview

Download Article