Cloud computing is the idea actualized to break up the Daily Computing Problems. Cloud computing is essentially virtual pool of resources and it gives these resources to clients through web interface. Cloud computing is the web based improvement and utilized as a part of PC innovation. The common issue related with Cloud computing is information protection, security, obscurity and unwavering quality and so forth. The paper proposed a new authentication method for validating cloud users. The Paper proposed a new technique for energy consumption reduction in cloud centers so that efficient computing can be done An improved validation component for distinguishing client in cloud condition is likewise proposed. There are three fundamental parts engaged with this structure in particular Cloud User (CU), Trusted Authenticator (TA) and Cloud Service Providers (CSPs). The TA gives secure access to the client by creating the computerized mark. In this paper, the means for confirming the clients are additionally depicted and the power consumption is also reduced.s.
privacy, encryption, decryption, cloud registering, security, trusted authenticator (TA), energy consumption, energy reduction
Abdul D. S., Elminaam H. M., Kader A., Hadhoud M. M. (2009). Performance evaluation of symmetric encryption algorithms. International Conference on Parallel, Distributed and Grid Computing, Vol. 8, pp. 58-64. https://doi.org/10.1109/PDGC.2014.7030724
Arora P., Singh A., Tyagi H. (2012). Evaluation and comparison of security issues on cloud computing environment. World of Computer Science and Information Technology Journal, Vol. 2, No. 5, pp. 179-183
Bhisikar P., Sahu A. (2013). Security in data storage and transmission in cloud compituing. International Journal of Advanced Research in Cloud Science and Software Engineering, Vol. 3, No. 3, pp. 410-415.
Chandramohan D, Vengattaraman T, Rajaguru D, Ramachandran B., Dhavachelvan P. (2013). A privacy breach preventing and mitigation methodology for cloud serv ice data storage. IEEE International Advanced Computing Conference. https://doi.org/10.1109/IAdCC.2013.6514199
Fanfara P., Dankova E., Dufala M. (2012). Usage of asymmetric encryption algorithms to enhance the security of sensitive data in secure communication. IEEE 10th Jubilee International Symposium on Applied Machine Intelligence and Informatics, pp. 213-217. https://doi.org/10.1109/SAMI.2012.6208959
Gampala V., Inuganti S., Muppidi S. (2012). Data security in cloud computing with elliptic curve cryptography. International Journal of Soft Computing and Engineering, Vol. 2, pp. 138-141.
Gupta S., Satapathy S. R., Mehta P., Tripathy A. (2012). A secure and searchable data storage in cloud computing. IEEE International Advance Computing Conference, pp. 106-109. https://doi.org/10.1109/IAdCC.2013.6514203
Harjani D., Jethwani M., Keswaney N., Jacob S. (2013). Automated parking management system using license plate recognition. Int. J. Computer Technology & Applications, Vol. 4, No. 5, pp. 741-745.
Hirani S. (2003). Energy consumption of encryption schemes in wireless devices thesis. Master's Thesis, University of Pittsburgh.
Jadeja Y., Modi K. (2012). Cloud co mputing - concepts, architecture and challenges. 012 International Conference on Computing, Electronics and Electrical Technologies, pp. 877-879. https://doi.org/10.1109/ICCEET.2012.6203873
Jansma N., Arrendond B. (2004). Performance comparison of elliptic curve and RSA digital signatures. International Conference on Information and Network Technology, pp. 58-62.
Kaur H., Kaushal K. (2011). Security concerns in cloud computing. High Performance Architecture and Grid Computing: International Conference, pp. 103-112. https://doi.org/10.1007/978-3-642-22577-2_14
Kumar A., Lee B. G., Lee H., Kumari A. (2012). Secure storage and access of data in cloud computing. International Conference on ICT Convergence, pp. 336-339. https://doi.org/10.1109/ICTC.2012.6386854
Leistikow R., Tavangarian D. (2013). Secure picture data partitioning for cloud computing services. International Conference on Advanced Information Networking and Applications Workshops, pp. 668-671. https://doi.org/10.1109/WAINA.2013.157
Nadeem A., Javed M. Y. (2005). A performance comparison of data encryption algorithms. IEEE Information and Communication Technologies, pp. 84-89. https://doi.org/10.1109/ICICT.2005.1598556
Nirmala V., Sivanandhan R. K., Lakshmi R. S. (2013). Data confidentiality and integrity verification using user authenticator scheme in cloud. International Conference on Green High Performance Computing. https://doi.org/10.1109/ICGHPC.2013.6533902
Srikanth B., Kumar H., Rao K. U. M. (2018). A robust approach for WSN localization for underground coal mine monitoring using improved RSSI technique. Mathematical Modelling of Engineering Problems, Vol. 5, No. 3, pp. 225-231. https://doi.org/10.18280/mmep.050314
Sudha M., Monica M. (2012). Enhanced security framework to ensure data security in cloud computing using cryptography. Advances in Computer Science and its Applications, Vol. 1, No. 1, pp. 32-37.
Wang M. M., Zhu G. L., Zhang X. Q. (2018). General survey on massive data encryption. International Conference on Computing Technology and Information Management, pp. 150-155.
Zhang B., Peng C. G., Xu Z. P. (2011). Identity-based distributed cloud storage encryption scheme. International Conference on Reliability, Maintainability and Safety, pp. 610-614. https://doi.org/10.1109/ICRMS.2011.5979341