Published June 5, 2016 | Version v1
Journal article Open

SECURE DATA AUTHENTICATION IN CLOUD USINGTRUSTED THIRD PARTY MODULE

Description

Now a days Information sharing is not an easy task if the information  is sensitive part of the cloud and if it has the role based access permission required.If particular  document is uploaded by the data owner system module then data owner encrypt that file and give the attribute based security along with that file.This property is especially important to any large scale Information sharing system, as the single and multi user compromise the key then it will be problem to data owner to secure the data. In this paper provide for main purpose a concrete and efficient instantiation of scheme provided, prove its attribute based security and provide an implementation part  to show its practicality. It has become more challenging part for data owner to share the data on cloud based System which is already existing use different technique to solves security problems.Solutions which are existing system to solve this issue are becoming very critical part to handle the key based data security and it sharing information.This paper will introduce the Trusted Third Party to authenticate user permission those who have the access to the data on cloud System.Trusted Third Party will use the Md-5 algorithm to generate the key and that key will get share to Athorise user as well as the owner. The Trusted Third Party module receives encrypted file F using RSA Algorithm from the data owner and computes hash value using MD-5 algorithm.It stores key in its database which will be used during the changeble operations and to determine the cheating party in the system cloud service Provider and data owner.Trusted Third Party send files F to Cloud Service Provider module to store on cloud.

Files

9.pdf

Files (453.9 kB)

Name Size Download all
md5:5e6ef2b620b5807c3177f79bf931d383
453.9 kB Preview Download