Open Access Open Access  Restricted Access Subscription Access

STABLE: Research on M-RSA-based Blockchain-based Trusted Authentication System for Legacy Environment

Mahima .

Abstract


Although cloud computing is a major force behind the IT sector, cloud data handling requires careful consideration of security issues. The cloud data's accuracy is under danger. Cloud-related infrastructures continue to be vulnerable to a variety of internal and external data integrity risks despite being far more robust and reliable than computer hardware. In this research, we offer a private privacy-preserving secure cloud storage system. This approach allows the data owner to upload data to the cloud (using Google Drive), where it can be modified with the use of a private key. The RSA-based technique uses a newly developed security algorithm based on Encrypted User End Generated (EUEG) to protect cloud computing environments. This technique improves security testing by reducing the role of third parties and automatically logs malicious devices to generate keycodes using user passwords, system disk numbers, and motherboard numbers.


Full Text:

PDF

References


Ravi Kant Sahu and Abhishek Mohta, L.K. Awasthi ”Robust Data Integration While Using Third Party Auditor For Cloud Data Storage Services”, conf. IJARCSSE, 2012, Volume 2, Issue 2,ISSN: 2277 128X

Qian Wang and Cong Wang and Kui Ren, Wenjing Lou, Jin Li “Enabling Public Auditability And Data Dynamics For Storage Security in Cloud Computing” in IEEE transactions on parallel and distributed systems, 2011, vol. 22, no. 5.

M.Ashah and R. swaminathan and m.baker”Privacy-Preserving Audit And Extraction of Digital Contents”, 2011.

Farzad Sabahi,“Cloud Computing Security Threats and Responses” ,IEEE confer. 2011, 978-1-61284-486-2/111

[5]Govinda V, and Gurunathaprasad, H Sathshkumar,”Third Party Auditing For Security Data Storage in cloud through digital signature using RSA” IJASATR, 2012, issue 2,vol-4, Issn 2249-9954.

Clock Skew Based Client Device Identification in Cloud Environments Wei-Chung Teng Dept. of Computer Science & Info. Eng. National Taiwan University of Sci. & Tech.

Cloud Computing: Risks and Auditing, Phil Lageschulte and Sailesh Gadia

A. Juels and B. S. Kaliski Jr., “Pors: proofs of retrievability for large files,” in Proceedings of the 14th ACM conference on Computer and communications security (CCS), pages 584–597, New York, NY, USA, 2007. ACM.

W. Enck, P. Gilbert, B. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth, "TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones", In Proc. of the USENIX Symposium on Operating Systems

Design and Implementation (OSDI), Vancouver, Canada, October. 4-6, 2010.


Refbacks

  • There are currently no refbacks.