- Abstract
- Keywords
- Cite This Article as
- Corresponding Author
One of the popular area in Information Technology (IT) is Cloud computing. It provides services such as Software as a Service (SaaS), Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) in on-demand basis. Clouds are capable of servicing millions of user requests. Due to huge amount of sensitive information are stored in cloud there is a need to authorize and authenticate users to prevent attacks that can be performed over the cloud. The cloud era has brought various challenges to handle malicious insider and cyber-attacks. By setting access control for cloud users only authorized users can have access valid cloud-provide service. Cryptographic techniques is be used to enforce some form of access control. The proposed HECKBE system protocol which includes the additional feature of applying hyper elliptic cryptography to exhibit a higher and secured authentication method which are used to provide access control to the valid users to gain access from cloud. A protocol HECKBE is applied to obtain privacy and authenticity. It is used to secure highly sensitive information like Health records, Financial records and various societal applications in cloud.
[Selvi S. and M. Gobi (2016); Access Control Protocol applied in cloud to enhance security using Hyper Elliptic Curve Cryptography Int. J. of Adv. Res. 4 (Aug). 144-150] (ISSN 2320-5407). www.journalijar.com