Monitoring Data Integrity while using TPA in Cloud Environment
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 7
Abstract
Cloud Computing is the arising technology that delivers software, platform and infrastructure as a service over a network. Cloud minimizes the burden of users by allowing them to remotely store their data and eliminates the need of local storage and maintenance. Even though benefits are higher but while storing data in cloud, correctness of data and security are major concerns as there are many chances for CSP to behave unfaithfully towards users regarding the status of their outsourced data. In order to overcome the threat of integrity, user can entrust third party auditor to assess the risk of outsourced data when needed .For this, in our proposed scheme we are using SHA-2 which is cryptographic hash function to verify integrity of data along with XOR mechanism, Station-to-Station key protocol for key generation and mutual authentication with TPA
Authors and Affiliations
Jaspreet Kaur , Jasmeet Singh
Fruits Sorting and Grading using Fuzzy Logic
Now a days, the classification and grading is performed based on observations and through experience. The system utilizes image-processing techniques to classify and grade fruits. The developed system starts the...
A Novel Watermarking Technique Based on Visual Cryptography
Digital Watermark processing technology has developed very rapidly during the recent years and widely applied to protect the copyright of digital image. In today’s scenario protection of digital data is utmost ne...
Image Steganography With LSB
:The rapid development of data transfer through internet has made it easier to send the data accurate and faster to the destination, but in order to transfer the data securely to the destination without any modif...
CLUSTER ANALYSIS OF SSTS FRAMEWORK USING SOCIAL NETWORK ANALYSIS
Educational Data Mining (EDM) is an emerging trend, concerned with developing methods for exploring the large data related to educational system. The data is used to obtain the Implicit and Explicit knowledge distr...
Query Optimization: Finding the Optimal Execution Strategy
The query optimizer is the component of a database management system that attempts to determine the most efficient way to execute a query. The optimizer considers the possible query plans for a given input query, a...