Two End Point Verification of Secure Data Storage Over Cloud

Download Now
Provided by: International Journal of Engineering Trends and Technology
Topic: Security
Format: PDF
The authors are proposing an empirical model of out sourcing of information to multiple data owners with secure key generation and two level authentication process, one is over data owners and other is over key generation center. Initially data owner level authentication cane performed with secret key and random challenges and followed by key generation process and after reconstruction of the key generation center also authenticated with signature or hash code. Shamir secret sharing technique can be used for secure key generation.
Download Now

Find By Topic