Reference Hub36
Ensure Hierarchal Identity Based Data Security in Cloud Environment

Ensure Hierarchal Identity Based Data Security in Cloud Environment

Shweta Kaushik, Charu Gandhi
Copyright: © 2019 |Volume: 9 |Issue: 4 |Pages: 16
ISSN: 2156-1834|EISSN: 2156-1826|EISBN13: 9781522567790|DOI: 10.4018/IJCAC.2019100102
Cite Article Cite Article

MLA

Kaushik, Shweta, and Charu Gandhi. "Ensure Hierarchal Identity Based Data Security in Cloud Environment." IJCAC vol.9, no.4 2019: pp.21-36. http://doi.org/10.4018/IJCAC.2019100102

APA

Kaushik, S. & Gandhi, C. (2019). Ensure Hierarchal Identity Based Data Security in Cloud Environment. International Journal of Cloud Applications and Computing (IJCAC), 9(4), 21-36. http://doi.org/10.4018/IJCAC.2019100102

Chicago

Kaushik, Shweta, and Charu Gandhi. "Ensure Hierarchal Identity Based Data Security in Cloud Environment," International Journal of Cloud Applications and Computing (IJCAC) 9, no.4: 21-36. http://doi.org/10.4018/IJCAC.2019100102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Cloud computing has emerged as a new promising field in the internet. It can be thought as a new architecture for the next generation of IT enterprises. It allows the user to access virtualized resources over the internet which can be dynamically scaled. Here, the owner's data is stored at a distributed data centre, which are responsible for its security constraints such as access control and data transmission to user. As the owner does not have physical access on their own data, the data centres are not trustworthy, this resulted in the cloud data security demand. Today, many cloud service providers (CSPs) are using the asymmetric and public key cryptography (PKG) for authenticating and data security purposes using the digital identity of the user. To this end, this article focuses on cloud data storage and its delivery to authorized user. For this purpose, a hierarchal identity-based cryptography method is used for data security and checking the data integrity, in order to make sure that there is no alteration or modification done by a malicious attacker or CSP for its own benefit.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.