To Analysis the Data Security in Cloud Computing At User, Cloud Server and Third Party Level Using HMAC

Abstract

Cloud computing is an upcoming uprising in computer science and information technology industry because of its performance, security, accessibility, low cost and many other amenities. Cloud security is a multifaceted and highly complex issue. Today security is main issue in cloud. All industry is moving toward cloud computing so security of data on cloud is essential so different security algorithm (like DES, AES, RSA etc.) has been implemented. The cloud computing model revolves around three functional units or components like Cloud Service Provider (manages Cloud Storage Server), Client/Owner (for data maintenance and computation) and User (registered with the owner and uses the data of owner stored on the cloud.)In this paper, we consider to realize efficient and secure data sharing in proposed cloud, that is, a trusted private cloud and a public cloud are assumed in our system. Data security is major issue prevailing in world of cloud computing and to overcome that issue the model has been proposed. Proposed model has been organized using HMAC algorithm that it give throughout data security in cloud computing at different levels. The model is highly secure and protects the data during transit as well as data at rest. It also secures the data against all threats i.e. insight as well as outsight.

Authors and Affiliations

Anamika Sirohi, Vishal Shrivastava

Keywords

Related Articles

Stabilization of Black Cotton Soil Using Waste Foundry Sand & Lime

Black cotton soil is one of the major soil deposits of India. They exhibit high swelling and shrinking when exposed to changes in moisture content and hence have been found to be most troublesome from engineering consid...

Study of Volume Reduction by Reverse Osmosis and Evaporation of Waste Water

Now a days the problem of various industry effluents is disturbing river and environment. Industry effluent is one of the important biologically degradable wastewater streams, having typical characteristics. It is to be...

Application Based Multimodal Biometric System for Speech Controlled Device

Multimodal biometric systems have been widely used to overcome the limitations of unimodal biometric systems and to achieve high recognition accuracy. Unimodal biometric systems developed for each of the biometric featu...

A Heuristic Approach to Factoid Question Generation from Sentence

Question Generation (QG) and Question Answering (QA) are among the many challenges in natural language generation and natural language understanding. An automated QG system focuses on generation of expressive and factoi...

Power Flow Analysis of Radial Distribution System using Backward/Forward Sweep Method

Power flow analysis is a basic and necessary tool for any electrical system. A standard and efficient power flow technique is required for real-time applications such as switching, optimization of network and so on. The...

Download PDF file
  • EP ID EP21494
  • DOI -
  • Views 375
  • Downloads 15

How To Cite

Anamika Sirohi, Vishal Shrivastava (2015). To Analysis the Data Security in Cloud Computing At User, Cloud Server and Third Party Level Using HMAC. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(12), -. https://europub.co.uk/articles/-A-21494