Paper Title
Authentication & Isolation Of Cryptographic Services For Cloud Computing

Abstract
Cloud computing is a virtual environment in which resources of the computing infrastructure are provided as data security and access control when users outsource sensitive data for sharing on cloud servers, which are not within the same trusted domain as data owners. To keep sensitive user data confidential against untrusted servers, existing solutions usually apply cryptographic methods by disclosing data decryption keys only to authorized users. If a cloud system is responsible for both tasks on storage and encryption/decryption of data, the system administrators may simultaneously obtain encrypted data and decryption keys. This allows them to access information without authorization and thus poses a risk to information privacy. An authentication method is proposed at a lower level which can be implemented by cloud providers. It is a simple way of authentication which can be utilized by developers along with encryption