A Privacy Preserving of Composite Private/Public Key in Cloud Servers
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 9, Issue 4
Abstract
Security is a term used to provide secrecy of data from the illegal entries. It is used to prevent a user that he/she should not have access to. It is a two step process. The security system in the first step identifies who the user is by requiring the user to submit some sort of identification. This is called authentication, and it means that the system is trying to find out who you are. Once the system identifies who you are, in the next step the system has to determine that you should permitted to access the recourse. This part of the process is called authorization, and it means that the system is checking to see if you have privileges to perform a certain action. OAuth and OpenID are the authentication schemes are used for authentication but they also have privacy protection problems. Here we are proposing composite private key over cloud system which is protected by splitting key into different servers which combines to form a single composite key. In this approach we are having third party key servers used public key cryptography to save public/private keys of their clients. We are using ring signatures by forming the network into ring and public keys are shared from that ring structures. We are proposing this composite private/public key pairs for privacy preserving in the facebook and other social network. We also propose homomorphic algorithm to prevent the compromised key server problem with the attacker.
Authors and Affiliations
O Sri Nagesh
Effect of Principle Component Analysis and Support Vector Machine in Software Fault Prediction
Machine Learning (ML) approaches have a great impact in fault prediction. Demand for producing quality assured software in an organization has been rapidly increased during the last few years. This leads to increase in d...
Review of MANETS Using Distributed Public-key Cryptography
Ensuring security is something that is not easily done as many of the demands of network security conflict with the demands of mobile networks, majorly because of the nature of the mobile devices (e.g. low power consumpt...
Secure Similarity Search on Outsourced Metric Data
Cloud computing has become an affordable technology for outsourcing data. This will help individuals and organizations to have plethora benefits such as storage, platform, software and other services. In spite of the adv...
Aligning Cloud Computing Security with Business Strategy
These days, the technological growth in the IT sector is rapid. Cloud computing is also one of the new technologies that have both benefits and limitations. This paper gives an overview of how cloud computing can be help...
SVM Based Ranking Model for Dynamic Adaption to Business Domains
Huge information can be obtained from vertical search domains. Often the information is very large in such a way that users need to browse further to get the required piece of information. In this context ranking plays a...