International Journal of Engineering Trends and Technology
In cloud computing, storing data into cloud and retrieving data from the cloud can be done more securely. Before storing data the cloud must verify the authenticity of the series without knowing the user's identity. In this paper, the authors are proposing concepts of authentication of users, secret key sharing, and encryption of data and decryption of data using cryptography technique. The scheme prevents replay attacks and supports creation, modification, and reading data stored in the cloud. In this approach, they are also provides user revocation and prevent replay attack.