Multilevel Security Model for Cloud Third-Party Authentication

Cloud computing is an information technology where the users can slightly accumulate their outsourced information so as to enjoy requiring high feature application and facility from configurable resources. Using an information data exchange, users should be worry-free from the load of local information storage and protection. In the existing system, a third-party auditor demands the local copy of the user’s outsourced data; this will increase the possibility of client files being stolen by the third-party auditor. Therefore this system will not provide any assurance of data integrity and availability. Thus the correctness of information is being placed at high risk, which is the major problem. To avoid the previously mentioned problem, the clients can store their data on the server which does not include a local copy of the data and thus can provide privacy against a third-party auditor. Thus this system will not drip any private information to the third party. To achieve these objectives this system will provide a mechanism that uses Kerberos as a third-party auditor/authenticator, and the RSA algorithm for secure communication; an MD5 algorithm is used to verify data integrity. Data centers are used for storing of data on the cloud in an effective manner with a secured environment and providing multilevel security to the database.

[1]  D. Theng,et al.  VM Management for Cross-Cloud Computing Environment , 2012, 2012 International Conference on Communication Systems and Network Technologies.

[2]  Deepti P. Theng,et al.  Analysing Security and Privacy Management for Cloud Computing Environment , 2014, 2014 Fourth International Conference on Communication Systems and Network Technologies.

[3]  Cong Wang,et al.  Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.

[4]  Ravi Kant Sahu,et al.  Cloud Data Security while using Third Party Auditor , 2013 .

[5]  Sawan V. Baghel,et al.  A survey for secure communication of cloud third party authenticator , 2015, 2015 2nd International Conference on Electronics and Communication Systems (ICECS).

[6]  Cong Wang,et al.  Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[7]  Cong Wang,et al.  Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).

[8]  Cong Wang,et al.  Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.