Loading

Cloud Computing Security Management using CSP
Rasha Rokan Ismail1, Taha Mohammed Hasan2

1Rasha Rokan Ismail, Department of Computer Science, Diyala University, Iraq.
2Taha Mohammed Hasan, Department of Computer Science, Diyala University, Iraq.

Manuscript received on May 25, 2020. | Revised Manuscript received on June 29, 2020. | Manuscript published on July 30, 2020. | PP: 1230-1236 | Volume-9 Issue-2, July 2020. | Retrieval Number: E4975018520/2020©BEIESP | DOI: 10.35940/ijrte.E4975.079220
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The cloud was defined by lots of experts, yet the NIST (National Institute of Standards and Technology) has presented the definition: “a model for enabling comfortable, on-demand network access to a shared pool of configurable computing resources The aim of this paper is a model for safe data sharing on cloud computing with intension to provide data confidentiality and access control over shared data, it also removes the burden of key management and files by users. The system also supports dynamic changes of membership and enables clients to reach the data they require even when the owner does not exist in the system. In the proposed system, a new security system is introduced, it provides a mechanism through which communication is safely achieved as well as it protects users and their hidden information from unauthorized users. The Entities in Proposed System consist of three parts: CSP, Users (owner ,clients ) and TPA , in this paper the focus will be on the CSP and the users. The proposed system are provides data confidentiality, access control of share data, removes the burden of key management and file encryption/decryption byusers, support dynamically of users membership. The use of a digital signature ensures the integrity and confidentiality of sharing data sent by users so that it cannot be read by the recipient TPA as it encrypts, sends a new encrypted signature and sends it to the CSP so that it cannot read its content CSP proved to be effective in the security of cloud computing. 
Keywords: NIST, CSP, TPA.