Efficient user authentication, server allocation and secure data storage in cloud Online publication date: Tue, 21-Jan-2020
by Manoj Tyagi; Manish Manoria; Bharat Mishra
International Journal of Internet Technology and Secured Transactions (IJITST), Vol. 10, No. 1/2, 2020
Abstract: With the increased popularity and the need to store the sensitive data over the cloud, the security of stored data is a very big challenge. This work has not only investigated and rectified the susceptibility of the data in the cloud, but also proposed the technique for user authentication and server allocation efficiently. Cuckoo search algorithm (CSA) is applied for efficiently allocating the server. For maintaining the privacy of client's data over the cloud, improved attribute-based encryption (IABE) can effectively do attribute adjunction/revocation, reduce the time complexity as well as safeguard from collusion attacks. The minimum set generation, proxy key generation, file updation, and secret key updation, is modified for efficient attribute revocation/adjunction. The combination of IABE with CSA achieves the security objective and the process is enhanced efficiently.
Online publication date: Tue, 21-Jan-2020
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Internet Technology and Secured Transactions (IJITST):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email firstname.lastname@example.org