Cloud Data Security While using Third Party Auditor

نویسندگان

  • Ashish Bhagat
  • Ravi Kant Sahu
  • Toby J. Velte
  • Qian Wang
  • Cong Wang
  • Kui Ren
  • Wenjing Lou
  • Jin Li
  • Abhishek Mohta
  • L. K. Awasthi
چکیده

In this paper the computing resources in the form of service rather than a utilities and product are provided to users over internet. The corporate world there are huge number of client which is accessing there data and modifying the data. The cloud is a platform where the data owner remotely stores their data in cloud. The goal of cloud computing concept is to secure and protect the data which come under the property of users and security of cloud computing environment is exclusive research area into which requires further development from both academic and research communities. The cloud application and services move to centralized huge data center and services and management of this data may not be trustable into cloud environment the computing resources are under control of service provider and the third-party-auditor ensures the data integrity over out sourced data. Third-party-auditor not only read but also may be change the data. Hence a mechanism should be provided who solved the problem. 1st the examines the problem contradiction between client CSP new potential securities schemes used to solve problem. the purpose of this paper is attempted to bring greater clarity landscape about cloud computing security and their solution at user level using encryption which ensure the data owner and client that there data are intact using algorithm. .

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Review on Public Auditing for Cloud Storage using Third Party Auditors

Cloud computing is recent blooming technology which provides various services like storage, platform, applications etc. through internet. In cloud computing, data owner hosts (stores) their data on cloud servers and data users access those data through cloud servers any time and from any place. This leads to data outsourcing on cloud in high amount. But because of vast amount of data on cloud, ...

متن کامل

To Enhance Homomorphic Encryption scheme for Key Management and Key Sharing in Cloud Computing

The cloud can offer services to the users at lower cost and services are available at anytime, anywhere, user data security is the main challenge in cloud computing. The data encryption is the best way for providing data security in cloud computing. Fully homomorphic encryption scheme is reliable and secure encryption technique. The main problem with fully disk encryption scheme is key manageme...

متن کامل

Enhanced data security model for cloud using ECC algorithm and third party auditor

With the invention of cloud, the days of keeping all the documents on the computer’s hardware are gradually coming to an end. Today, people outsource their data at Cloud Service Provider (CSP)[1] who offers huge storage space at low cost. But as the data goes on cloud the user loses his control over the data and seeks for data security. Hence an efficient and effective method is needed to ensur...

متن کامل

A Survey on Various Techniques of Data Storage on Cloud using Third Party Auditor

In present scenario cloud computing emerges as one of the most powerful computing technology to provide dynamic service on demand on very large scale over the internet. Cloud computing offers various features like scalability, pay on use, using these features giants companies use cloud to store their data, In cloud computing data stores on cloud at remote location and cloud user hopes that his/...

متن کامل

Preserving Privacy using Third Party Auditor in Cloud for Data Storage

Cloud computing is a internet based thing or next generation in information technology. Users store their large amount of data on a cloud server at the remote place without worrying about storage correctness and integrity of data. Security is viewed as one of the top positioned open issues in cloud computing. In most of the before proposed schemes, RSA algorithm was used for storage security. A...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012