Paper Title
Authentication & Isolation Of Cryptographic Services For Cloud Computing
Abstract
Cloud computing is a virtual environment in which resources of the computing infrastructure are provided as
data security and access control when users outsource sensitive data for sharing on cloud servers, which are not within the
same trusted domain as data owners. To keep sensitive user data confidential against untrusted servers, existing solutions
usually apply cryptographic methods by disclosing data decryption keys only to authorized users. If a cloud system is
responsible for both tasks on storage and encryption/decryption of data, the system administrators may simultaneously
obtain encrypted data and decryption keys. This allows them to access information without authorization and thus poses a
risk to information privacy. An authentication method is proposed at a lower level which can be implemented by cloud
providers. It is a simple way of authentication which can be utilized by developers along with encryption