International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Science , Computer Science and Engineering

Volume5,January 2018,

Topic : A Revocable Two Factor Data Security Model for Cloud Computing

Authors:Padakanti Sabitha || V.Sridhar Reddy

Abstract:Since data in cloud will be placed anywhere, because of the critical nature of the applications, it is important that clouds be secure. The major security challenge with clouds is that the owner of the data may not have control of where the data is placed. This is because if one wants to exploit the benefits of using cloud computing. This requirement imposes clear data management choices: original plain data must be accessible only by trusted parties that do not include cloud providers, intermediaries, and Internet; in any untrusted context, data must be encrypted. Satisfying these goals has different levels of complexity depending on the type of cloud service. This system proposed an improve data security protection mechanism for cloud using two components. In this system sender sends an encrypted message to a receiver with the help of cloud system. The sender requires to know identity of receiver but no need of other information such as certificate or public key. To decrypt the cipher text, receiver needs two parts. The first thing is a unique personal security device or some hardware device connected to the computer system. Second one is private key or secrete key stored in the computer. Without having these two things cipher text never decrypted. The import ant thing is the security device lost or stolen, then cipher text cannot be decrypted and hardware device is revoked or cancelled to decrypt cipher text..

Keywords:

Download Paper


DOI: 01.1617/vol5/iss1/pid26314


Related Articles

Wormhole Attack Prevention and Detection Approaches in Mobile Ad hoc Networks: A Survey.

Authors: Avinash Singh || Ram Singar Verma

Doi : 01.1617/vol4/iss03/pid34591

Volume4 ,March 2018.

Developing a GIS Platform for Tourism marketing and promotion In Nigeria: Case Study Of Bauchi State

Authors: Abubakar Siddiq Ango || Abdulsalam Waheed Abdulfatah, Idrissa Djibo

Doi : 01.1617/vol3/iss09/pid91783

Volume3 ,September 2018.

Decentralized Trust Management and Trust Worthiness of Cloud Environments

Authors: Qhubaib Syed || Syed Afzal Ahmed,Syed Abdul Haq

Doi : 01.1617/vol4/iss4/pid21386

Volume4 ,April 2018.

Brain Controlled Chess Based on Virtual Reality Control for Paralyzed Patients

Authors: Sindhura Rao || Ashwini S,Kusuma Mohanchandra

Doi : 01.1617/vol4/iss4/pid82074

Volume4 ,April 2018.

Multilevel Authentication System

Authors: Nichita Silva Lobo || Beverly Rodrigues,Pavni Alluri,Prathibha Singh,Nicole Alvares

Doi : 01.1617/vol4/iss4/pid82135

Volume4 ,April 2018.

Stock Prediction Using Clustering And Regression Techniques

Authors: Shalini Lotlikar || Megha Ainapurkar

Doi : 01.1617/vol4/iss4/pid39708

Volume4 ,April 2018.

Brain Tumor Detection using Image Segmentation

Authors: Siddhi N. Nerurkar ||

Doi : 01.1617/vol4/iss4/pid02845

Volume4 ,April 2018.

Video Mining using Query by Example

Authors: Rosebud Valadares ||

Doi : 01.1617/vol4/iss4/pid89542

Volume4 ,April 2018.

Fuzzy Opinion Mining for Product Recommender System

Authors: Aarti Bandodker ||

Doi : 01.1617/vol4/iss4/pid03652

Volume4 ,April 2018.

Aadhaar and Server based Electoral system

Authors: Yugansh Garg || Sakshi Mishra

Doi : 01.1617/vol4/iss4/pid69053

Volume4 ,April 2018.

.

Call for Papers


Editor-in-Chief

Editor Image


Dr. Allon Guez
Professor, Drexel University,
USA


View more


IMPACT FACTOR: 4.890

ISSN(Online):2394-2320

Google Scholar Profile

Thomson Reuters ID : q-6288-2016.
ORCiD Research ID : 0000-0001-9540-6799

All Issues


ACCEPTANCE RATIO

ACCEPTANCE RATIO: 28.69%
ARTICLES PUBLISHED:0521
PAPER RECEIVED:01730
Journal Code : IJERCSE
Electronic ISSN : 2394-2320
Impact Factor : 4.890
Frequency : monthly
Contact : info@ijercse.com


IFERP OTHER JOURNALS


Subscribe

           Email:

SOCIAL MEDIA