A cloud computing security schemes:- TGOS [Threshold group-oriented signature] and TMS [Threshold multisignature schemes]

A.A. Deshmukh, A. Mihovska, R. Prasad

Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

3 Citations (Scopus)

Abstract

Cloud computing refers to the ability to access and manage information stored on remote servers, using any Internet-enabled platform, including smart phones. In the cloud, any user can can access and/or remotely store respective data with minimal management effort or service provider interaction. Without the knowledge of the physical location of the server or how the processing of sensitive and personal data is confgured, end users consume cloud services without any information about the processes involved. This brings about issues related to security, privacy and trust. This paper proposes a combined solution based on threshold group-oriented signatures TGOS and threshold multisignature (TMS) as a secure and efficient access to cloud services. The proposal is a privacy-presereving third-party auditing protocol, independent of data encryption and with a focus on security for data storage.
Original languageEnglish
Title of host publicationProceedings of the 2012 World Congress on Information and Communication Technologies, WICT 2012
Number of pages6
PublisherIEEE
Publication date1 Jan 2012
Pages203-208
ISBN (Print)9781467348041
DOIs
Publication statusPublished - 1 Jan 2012
EventWorld Congress on Information and Communication Technologies - Trivandrum, India
Duration: 30 Oct 20122 Nov 2012

Conference

ConferenceWorld Congress on Information and Communication Technologies
Country/TerritoryIndia
CityTrivandrum
Period30/10/201202/11/2012

Fingerprint

Dive into the research topics of 'A cloud computing security schemes:- TGOS [Threshold group-oriented signature] and TMS [Threshold multisignature schemes]'. Together they form a unique fingerprint.

Cite this