Download PDFOpen PDF in browserAn efficient and secure user authentication and communication scheme based on blowfish and blake2b algorithm using Cloud computingEasyChair Preprint 22869 pages•Date: December 31, 2019AbstractCloud computing is a current trend of computing that provides a lot of services to computer user, government agencies and business. Cloud computing is the delivery of on-demand computing services and enable on-demand access to shared pool of resources over the internet. Cloud computing and storage solutions provide users and enterprises with various capabilities to store and process their data in third party data centers. Security of data is one of the major issue in cloud computing. In Cloud computing data security can be improved by the Encryption & Decryption, Message authentication code, and Hash function. The proposed model included the combination of a symmetric algorithm and a hashing algorithm to achieve confidentiality and data integrity. Keyphrases: Authentication, Authorization, Cloud Computing, Confidentiality., Data Integrity
|