Framework for User Authenticity and Access Control Security over a Cloud

Journal Title: International Journal on Computer Science and Engineering - Year 2014, Vol 6, Issue 4

Abstract

Cloud computing has emerged as a computing paradigm bringing forward many new challenges for data security and access control when users outsource sensitive data for sharing on cloud servers, which are not within the same trusted domain as data owners. Considering the user access control part, in recent years many new findings have been worked upon to provide better user access control while accessing services over a cloud. But the problem still remains unresolved and if resolved by some encryption/decryption methods are problematic in some way or the other. Here security issue related to user authentication and access control is addressed and given an insight into it, along with providing some valuable inputs which if implemented according to the plan proposed might come up with better solutions to user authentication and CSP’s critical data security issue. This paper mainly considers various points, like securing access to services of cloud users, protecting user credentials data files stored with CSP and other critical information related with CSP and cloud users.

Authors and Affiliations

Mr. Amit Wadhwa , Dr. V. K. Gupta

Keywords

Related Articles

UNICODE and Colors Integration tool for Encryption and Decryption

Cryptography, to most people, is concerned with keeping communications private. Indeed, the protection of sensitive communications has been the emphasis of cryptography throughout much of its history. Encryption is the t...

An Efficient Protocol for Resource Constrained Platforms Using ECC

At present, most of e-commerce applications are developed using asymmetric cryptography to guarantee the authentication of the involved parties. On the other hand, a growing demand for mobile devices has geared a shift t...

A Comparative Study of Google and Bing Search Engines in Context of Precision and Relative Recall Parameter

This paper compared the retrieval effectiveness in context of precision and relative recall of Google and Bing search engine for evaluating the effectiveness of both search engine. The queries used are related to general...

ACO Based Feature Subset Selection for Multiple k-Nearest Neighbor Classifiers

The k-nearest neighbor (k-NN) is one of the most popular algorithms used for classification in various fields of pattern recognition & data mining problems. In k-nearest neighbor classification, the result of a new i...

Ant Colony Optimization approach for Solving FPGA routing with minimum Channel Width

In this paper ANT colony optimization algorithm has been proposed to solve FPGA routing in FPGA design architecture with minimum umbers of tracks per channel. In our method geometric FPGA routing task is transformed into...

Download PDF file
  • EP ID EP105205
  • DOI -
  • Views 93
  • Downloads 0

How To Cite

Mr. Amit Wadhwa, Dr. V. K. Gupta (2014). Framework for User Authenticity and Access Control Security over a Cloud. International Journal on Computer Science and Engineering, 6(4), 138-141. https://europub.co.uk/articles/-A-105205