Survey on Privacy Preserving Authentication Protocol in Cloud Computing
Neha Mahakalkar1, Vaishali Sahare2

1Neha Mahakalkar, Department of Computer Science and Engineering, G.H.R.I.E.T. Nagpur (Maharashtra) India.
2Vaishali Sahare, Department of Computer Science and Engineering, G.H.R.I.E.T. Nagpur (Maharashtra). India.  

Manuscript received on 15 February 2017 | Revised Manuscript received on 22 February 2017 | Manuscript Published on 28 February 2017 | PP: 126-128 | Volume-6 Issue-3, February 2017 | Retrieval Number: C4854026317/17©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cloud computing provides facilities of shared computer processing resources and data to computers and other device on demand. System environment will develop by using three key entities trusted third party, data owner and user. The concept of shared authority based privacy preserving authentication protocol i.e., SAPA used to develop system to perform shared access in multiple user. Security and privacy issue as well as shared access authority will be achieve by using access request matching mechanism e.g. authentication, user privacy, user can only access its own data fields. The multiple users want to share data so that purpose re-encryption is used to provide high security for user private data. Universal Composability (UC) model use to prove that design of SAPA correctness. Develop a system with high security and attack free by analysing different attack related to the system. Privacy preserving data access authority sharing is attractive for multi user collaborative cloud applications
Keywords: Authentication, Security, Shared Access And Cloud Computing

Scope of the Article: Cloud Computing