Ensure Hierarchal Identity Based Data Security in Cloud Environment

Ensure Hierarchal Identity Based Data Security in Cloud Environment

Shweta Kaushik, Charu Gandhi
ISBN13: 9781799853510|ISBN10: 1799853519|EISBN13: 9781799853527
DOI: 10.4018/978-1-7998-5351-0.ch022
Cite Chapter Cite Chapter

MLA

Kaushik, Shweta, and Charu Gandhi. "Ensure Hierarchal Identity Based Data Security in Cloud Environment." Research Anthology on Blockchain Technology in Business, Healthcare, Education, and Government, edited by Information Resources Management Association, IGI Global, 2021, pp. 368-384. https://doi.org/10.4018/978-1-7998-5351-0.ch022

APA

Kaushik, S. & Gandhi, C. (2021). Ensure Hierarchal Identity Based Data Security in Cloud Environment. In I. Management Association (Ed.), Research Anthology on Blockchain Technology in Business, Healthcare, Education, and Government (pp. 368-384). IGI Global. https://doi.org/10.4018/978-1-7998-5351-0.ch022

Chicago

Kaushik, Shweta, and Charu Gandhi. "Ensure Hierarchal Identity Based Data Security in Cloud Environment." In Research Anthology on Blockchain Technology in Business, Healthcare, Education, and Government, edited by Information Resources Management Association, 368-384. Hershey, PA: IGI Global, 2021. https://doi.org/10.4018/978-1-7998-5351-0.ch022

Export Reference

Mendeley
Favorite

Abstract

Cloud computing has emerged as a new promising field in the internet. It can be thought as a new architecture for the next generation of IT enterprises. It allows the user to access virtualized resources over the internet which can be dynamically scaled. Here, the owner's data is stored at a distributed data centre, which are responsible for its security constraints such as access control and data transmission to user. As the owner does not have physical access on their own data, the data centres are not trustworthy, this resulted in the cloud data security demand. Today, many cloud service providers (CSPs) are using the asymmetric and public key cryptography (PKG) for authenticating and data security purposes using the digital identity of the user. To this end, this article focuses on cloud data storage and its delivery to authorized user. For this purpose, a hierarchal identity-based cryptography method is used for data security and checking the data integrity, in order to make sure that there is no alteration or modification done by a malicious attacker or CSP for its own benefit.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.