A Privacy Preserving of Composite Private/Public Key in Cloud Servers

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 9, Issue 4

Abstract

Security is a term used to provide secrecy of data from the illegal entries. It is used to prevent a user that he/she should not have access to. It is a two step process. The security system in the first step identifies who the user is by requiring the user to submit some sort of identification. This is called authentication, and it means that the system is trying to find out who you are. Once the system identifies who you are, in the next step the system has to determine that you should permitted to access the recourse. This part of the process is called authorization, and it means that the system is checking to see if you have privileges to perform a certain action. OAuth and OpenID are the authentication schemes are used for authentication but they also have privacy protection problems. Here we are proposing composite private key over cloud system which is protected by splitting key into different servers which combines to form a single composite key. In this approach we are having third party key servers used public key cryptography to save public/private keys of their clients. We are using ring signatures by forming the network into ring and public keys are shared from that ring structures. We are proposing this composite private/public key pairs for privacy preserving in the facebook and other social network. We also propose homomorphic algorithm to prevent the compromised key server problem with the attacker.

Authors and Affiliations

O Sri Nagesh

Keywords

Related Articles

Improving Routing Performance by Using Neighbor Coverage Knowledge and Energy Aware Metric in Mobile Adhoc Networks

A mobile adhoc network is an independent collection of mobile nodes without having the fixed infrastructure. In the mobile adhoc networks, because of the high mobility of the nodes there is frequent link breakage that ca...

A Proposed Methodology for Virus Detection Using Data Mining and Reverse Engineering Tools with Client-Server Model

Viruses are a class of malicious programs that cause unfavourable effects on the computer system and thereby becomes an obstacle to the standard operation of the system. Their existence and execution within the system sh...

A Support Vector Machine and Information Gain based Classification Framework for Diabetic Retinopathy Images

Image mining is the process of applying data analysis and discovery algorithms over large volume of image data. It has especially become popular in the fields of forensic sciences, fraud analysis and health care, for it...

Efficient User Authentication and Providing Host Security against Malware

To improve the trustworthiness of a host and system data cryptographic verification technique is used. From these approach users keystroke to identify the legitimate user’s to get the service from the server by using int...

An Efficient Boundary Detection and Image Segmentation Method Based on Perceptual Organization

In this paper, we presents a novel method for detecting the boundaries of the object in outdoor images by using most common properties of the images such as perceptual organization laws. Here the proposed segmentation sc...

Download PDF file
  • EP ID EP121283
  • DOI -
  • Views 116
  • Downloads 0

How To Cite

O Sri Nagesh (2014). A Privacy Preserving of Composite Private/Public Key in Cloud Servers. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 9(4), 202-208. https://europub.co.uk/articles/-A-121283