Security and authentication of outsourcing cloud data
Security and authentication of outsourcing cloud data
- Author(s): K. K. Chennam 1 ; R. Aluvalu 2 ; M.A. Jabbar 2
- DOI: 10.1049/icp.2021.0954
For access to this article, please select a purchase option:
Buy conference paper PDF
Buy Knowledge Pack
IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.
Thank you
Your recommendation has been sent to your librarian.
- Author(s): K. K. Chennam 1 ; R. Aluvalu 2 ; M.A. Jabbar 2
-
-
View affiliations
-
Affiliations:
1:
MJCET, CSE, Hyderabad , India ;
2: Vardhaman College of Engineering , CSE, Hyderabad , India
Source:
3rd Smart Cities Symposium (SCS 2020),
2021
p.
197 – 202
-
Affiliations:
1:
MJCET, CSE, Hyderabad , India ;
- Conference: 3rd Smart Cities Symposium (SCS 2020)
- DOI: 10.1049/icp.2021.0954
- ISBN: 978-1-83953-522-2
- Location: Online Conference
- Conference date: 21-23 September 2020
- Format: PDF
Now a day’s most of the services are related to cloud and becoming more popular in using the services to tenants. Most importantly and famous service of cloud is Database as a Service (DaaS). This cloud service provides various resources as managing, using and administration such as software, hardware and tenants’ networks. The data and executing of queries in database are managed by the administrator from cloud service provider (CSP). Due to lack of trust on third party service provider the security and authentication issues are always facing by the tenants which is motivated us to write this paper. This paper shows the brief description about cryptographic algorithms, various types and query authentication on data. In the end the conclusion of the paper by proposing a new scheme that carry through the security and authentication of querying results of outsourcing cloud data.
Inspec keywords: outsourcing; cryptography; authorisation; data privacy; query processing; trusted computing; cloud computing; database management systems
Subjects: Internet software; Information retrieval techniques; Data security; Database management systems (DBMS)