Book Details

A Survey of Various Mutual Authentication Techniques in Cloud Computing Security

International Journal of Computer Science (IJCS) Published by SK Research Group of Companies (SKRGC)

Download this PDF format


Modern technical move ahead have given increase to the recognition and accomplishment of cloud. This novel standard is ahead an increasing awareness, since it gives cost proficient designs that sustain the communication, storage space, and exhaustive computing of data. On the other hand, these shows potential storage space examines bring many difficult design concerns; significantly due to the failure of data organize. These confronts, explicitly data privacy and data reliability, have major control on the safety measures and concerts of the cloud structure. Some threat representations take for granted that the cloud service provider cannot be believed, and consequently security exclusives suggest a high level protection declaration, such as storing encrypted data in cloud servers. Additional assume that cloud providers can be confidences, and that probable threats come mainly from external attackers and additional malicious cloud users.


[1] S.S. Al-Riyami, K.G. Paterson, Certificateless Public Key Cryptography, In Asiacrypt 2003, LNCS 2894, pp 452-473, 2003.
[2] Danan Thilakanathan, Shiping Chen, Surya Nepal and Rafael A, “Secure Data Sharing in the Cloud”, S. Nepal and M. Pathan (eds.), Security, Privacy and Trust in Cloud Systems, 45 DOI: 10.1007/978-3-642-38586-5_2, © Springer-Verlag Berlin Heidelberg 2014.
[3] S. Jahid, P. Mittal, and N. Borisov, \EASiER: encryption-based access control in social networks with efficient revocation," in Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ser.ASIACCS '11. NewYork, NY, USA: ACM, 2011, pp. 411-415.
[4] S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable, and fine-grained data access control in cloud computing," in Proceedings of the 29th conference on Information communications, ser. INFOCOM'10. Piscataway, NJ, USA: IEEE Press, 2010, pp. 534-542.
[5] Seung-Hyun Seo, Mohamed Nabeel, Xiaoyu Ding and Elisa Bertino "An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds" IEEE Transactions On Knowledge And Data Engineering, Vol. 26, No. 9, September 2014.
[6] M. Myers, R. Ankney, A. Alpani, S. Galperin, C. Adams, X.509 Internet Public Key Infrastructure: Online Certificate Status Protocol (OCSP), RFC 2560.
[7] Ruhr “Cloud computing: Gaps in the cloud”. NewsRx Health Sci. (2011).
[8] S. Jarecki, C. S. Jutla, H. Krawczyk, M. Rosu, and M.Steiner. Outsourced symmetric private information retrieval. In CCS’13, Berlin, Germany, 2013, pages 875–888, 2013.
[9] Lei Xu, Xiaoxin Wu, Xinwen Zhang, “CL-PRE: a Certificateless Proxy Re-Encryption Scheme for Secure Data Sharing with Public Cloud” ASIACCS ’12, May 2–4, 2012, Seoul,Korea.
[10] Tu S, Niu S, Li H, Xiao-ming Y, Li M, “Finegrained access control and revocation for sharing data on clouds,” IEEE 26th international parallel and distributed processing symposium workshops and PhD forum (IPDPSW) 2012, pp 2146–2155.
[11] Ning Cao, Cong Wang, Ming Li, Kui Ren and Wenjing Lou "Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data" IEEE Transactions On Parallel And Distributed Systems, Vol. 25, No. 1, January 2014.
[12] X. W. Lei Xu and X. Zhang, “CL-PKE: A certificateless proxy re-encryption scheme for secure data sharing with public cloud,” in ACM Symp. Inform. Comput. Commun. Security, 2012.
[13] L. Shen, F. Zhang, Y. Sun, Efficient Revocable Certificate-less Encryption Secure in the Standard Model, The Computer Journal (2013) doi: 10.1093/comjnl/bxt040. First published online: April 30, 2013.
[14] C.-I. Fan, P.-H. Ho, J.-J. Huan and Y.-F. Tseng, “Secure Certificateless Signature Scheme Supporting Batch Verification.”In AsiaJCIS, 2013, pp. 8–11.


Public key, Cloud Computing, Public Key Encryption, Attacks, Data Sharing.

  • Format Volume 3, Issue 2, No 2, 2015.
  • Copyright All Rights Reserved ©2015
  • Year of Publication 2015
  • Author Miss. Richa Singh Dangi, Mr. Amit Saxena, Mr. Manish Manoria
  • Reference IJCS-104
  • Page No 591-597

Copyright 2021 SK Research Group of Companies. All Rights Reserved.