Auditing Services in Cloud Computing For Achieving Data Access Control

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1

Abstract

 Cloud computing has a great tendancy of providing robust computational power to the society at reduced cost. The wide adoption of this promising computation model is prevented by security which is the primary obstacle especially for customers when their confidential data are consumed and produced during the computation. The data stored in the cloud may be frequently updated by the users. It has been reported by many authors on auditing methods to efficiently audit the cloud data storage without challenging the local copy of data, and introduce no additional on-line load to the cloud user. This paper is a survey of different algorithms used in different auditing mechanisms that have been considered to support the storage correctness of data in cloud environment.

Authors and Affiliations

N. Mahesh kumar

Keywords

Related Articles

Voice Over Wifi Performance Evaluation and Comparisons of IEEE.802.11 B, A, G, N Releases

Abstract: Cellular networks are not always available indoors, either at home or work. 802.11 WiFi networks can solve part of this problem by providing Voice over WiFi (VoFi) phones or computer with communication devices...

Decision Tree Classification of Students Placement Factors Using R Data Miner

Student campus placement attitudes have largely been assessed using college students are relatively small samples. In addition, no systematic framework has been used to investigate the origins or influencing social facto...

The Data Analysis of Tencent Micro-blog User

Abstract: Micro-blog has been an important social network platform in recent years. With the advances in information influence and propagation ability, the date of micro-blog has attracted the attention of scholars of al...

 IVRS and DTMF based Voting System

 Abstract: A Voting System will be developed where a person can vote using a cell phone. A phone connected tothe voting system, will decode the DTMF pulses sent by another phone(mobile/landline) belonging to the vot...

 Preventing Web-Proxy Based DDoS using Request SequenceFrequency

 Abstract: In order to control the request flow in Computer Networks, a proxy server is used. Proxy Server is aserver which acts as an intermediary server between server and clients. The more adaptable and converted...

Download PDF file
  • EP ID EP104719
  • DOI -
  • Views 101
  • Downloads 0

How To Cite

N. Mahesh kumar (2014).  Auditing Services in Cloud Computing For Achieving Data Access Control. IOSR Journals (IOSR Journal of Computer Engineering), 16(1), 52-54. https://europub.co.uk/articles/-A-104719