Tversky Anonymous Key Authentication Based Blum Goldwasser Cryptography For Cloud Data Access Security
Main Article Content
Abstract
Cloud computing is an advanced technology for secured access with available resources. One of the fundamental security needs of data sharing is to guarantee the cloud server could fully control access to an unauthorized entity. In cloud, achieving flexible access of data and protecting privacy of receivers remains challenging issues. To deal with these challenges, a novel technique called Tversky Anonymous Key Authentication based Pseudo Randomized Blum Goldwasser Cryptographic Secured Data Access technique is introduced. The proposed Secured Data Storage technique includes five different steps such as the Registration phase, Anonymous key generation, Authentication, Encryption, and Decryption. Outcomes of Tversky Anonymous Key Authentication based Pseudo Randomized Blum Goldwasser Cryptographic Secured Data Access technique achieves greater secured data access in cloud than the conventional methods.
Article Details
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.