Cloud Computing Security Management using CSP

  • Ismail* R
  • et al.
N/ACitations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The cloud was defined by lots of experts, yet the NIST (National Institute of Standards and Technology) has presented the definition: “a model for enabling comfortable, on-demand network access to a shared pool of configurable computing resources The aim of this paper is a model for safe data sharing on cloud computing with intension to provide data confidentiality and access control over shared data, it also removes the burden of key management and files by users. The system also supports dynamic changes of membership and enables clients to reach the data they require even when the owner does not exist in the system. In the proposed system, a new security system is introduced, it provides a mechanism through which communication is safely achieved as well as it protects users and their hidden information from unauthorized users. The Entities in Proposed System consist of three parts: CSP, Users (owner ,clients ) and TPA , in this paper the focus will be on the CSP and the users. The proposed system are provides data confidentiality, access control of share data, removes the burden of key management and file encryption/decryption byusers, support dynamically of users membership. The use of a digital signature ensures the integrity and confidentiality of sharing data sent by users so that it cannot be read by the recipient TPA as it encrypts, sends a new encrypted signature and sends it to the CSP so that it cannot read its content CSP proved to be effective in the security of cloud computing.

Cite

CITATION STYLE

APA

Ismail*, R. R., & Hasan, T. M. (2020). Cloud Computing Security Management using CSP. International Journal of Recent Technology and Engineering (IJRTE), 9(2), 1230–1236. https://doi.org/10.35940/ijrte.e4975.079220

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free