Please use this identifier to cite or link to this item:
Title: Implementation of Anonymous Authentication in Cloud
Authors: Gupta, Shubhanshu
Verma, Ruchi [Guided by]
Keywords: Cloud computing
Cloud computing model
Cloud computing issues
Cloud authentication
Issue Date: 2015
Publisher: Jaypee University of Information Technology, Solan, H.P.
Abstract: This project deals with the security issue of authentication related to cloud computing. The cloud computing is a new computing model which comes from grid computing, distributed computing, parallel computing, virtualization technology, utility computing and other computer technologies. Despite several cost-effective and flexible characteristics of cloud computing, some clients are reluctant to adopt this paradigm due to emerging security and privacy concerns. Organization, where confidentiality of information is a vital act, are not assertive to trust the security techniques and privacy policies offered by cloud service providers. Malicious attackers have violated the cloud storages to steal, view, manipulate and tamper client’s data. Authentication is an important process in any system to verify whether someone is in fact. In any type of computer network such as private or public, authentication needs username and password. Password is a secrete key to verify the person is authentic. When user wish to use a system, first thing is user has to register with the system, then unique code is assigned for that person. On each subsequent use, the user must know and use the previously declared password. Authentication and authorization plays a major role which accessing the cloud service from vendors. Cloud customers should be authenticating enough to use the cloud services. Cloud authentication could be done in many ways like textual password, biometrics and graphical etc. In this project, I try to present a privacy-preserving security solution for cloud services. It deals with user anonymous access to cloud services and shared storage servers. The solution provides registered users with anonymous access to cloud services. This solution offers anonymous authentication. This means that user’s attributes can be proven without revealing users identity. Thus, users can use services without any threat of profiling their behavior. On the other hand, if users break provider’s rules, their access rights can be revoked. This solution offers anonymous access, unlinkability and the confidentiality of transmitted data.
Appears in Collections:B.Tech. Project Reports

Files in This Item:
File Description SizeFormat 
Implementation of Anonymous Authentication in Cloud.pdf2.45 MBAdobe PDFView/Open

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.