Tversky Anonymous Key Authentication Based Blum Goldwasser Cryptography For Cloud Data Access Security

Main Article Content

K.Mohana Prabha, P.Vidhya Saraswathi, S.Balamurali

Abstract

Cloud computing is an advanced technology for secured access with available resources. One of the fundamental security needs of data sharing is to guarantee the cloud server could fully control access to an unauthorized entity. In cloud, achieving flexible access of data and protecting privacy of receivers remains challenging issues. To deal with these challenges, a novel technique called Tversky Anonymous Key Authentication based Pseudo Randomized Blum Goldwasser Cryptographic Secured Data Access technique is introduced. The proposed Secured Data Storage technique includes five different steps such as the Registration phase, Anonymous key generation, Authentication, Encryption, and Decryption. Outcomes of Tversky Anonymous Key Authentication based Pseudo Randomized Blum Goldwasser Cryptographic Secured Data Access technique achieves greater secured data access in cloud than the conventional methods.

Article Details

Section
Articles