Two End point Verification of secure Data storage over Cloud

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2014 by IJETT Journal
Volume-17 Number-9
Year of Publication : 2014
Authors : Lankalapalli Bhargava, KunaVenkataKiran

MLA 

Lankalapalli Bhargava, KunaVenkataKiran "Two End point Verification of secure Data storage over Cloud", International Journal of Engineering Trends and Technology (IJETT), V17(9),450-453 Nov 2014. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract

We are proposing an empirical model of out sourcing of information to multiple data owners with secure key generation and two level authentication process, one is over data owners and other is over key generation center. Initially data owner level authentication cane performed with secret key and random challenges and followed by key generation process and after reconstruction of the key generation center also authenticated with signature or hash code. Shamir secret sharing technique can be used for secure key generation.

References

[1] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski,G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia,“Above the clouds: A berkeley view of cloud computing,” University of California, Berkeley, Tech. Rep. USB-EECS-2009-28, Feb 2009.
[2] Amazon Web Services (AWS), Online at http://aws. amazon.com.[3] Google App Engine, Online at http://code.google.com/appengine/.
[4] Microsoft Azure, http://www.microsoft.com/azure/.
[5] 104th United States Congress, “Health Insurance Portability and Accountability Act of 1996 (HIPPA),” Online at http://aspe.hhs.gov/admnsimp/pl104191.htm, 1996.
[6] H. Harney, A. Colgrove, and P. D. McDaniel, “Principles of policy insecure groups,” in Proc. of NDSS’01, 2001.
[7] P. D. McDaniel and A. Prakash, “Methods and limitations of security policy reconciliation,” in Proc. of SP’02, 2002.
[8] T. Yu and M. Winslett, “A unified scheme for resource protection inautomated trust negotiation,” in Proc. of SP’03, 2003.
[9] J. Li, N. Li, and W. H. Wins borough, “Automated trust negotiationusing cryptographic credentials,” in Proc. of CCS’05, 2005.
[10] J. Anderson, “Computer Security Technology Planning Study,” AirForce Electronic Systems Division, Report ESD-TR-73-51, 1972,

Keywords
multi owner data sharing, group key management, cryptography.