To Analysis the Data Security in Cloud Computing At User, Cloud Server and Third Party Level Using HMAC
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 12
Abstract
Cloud computing is an upcoming uprising in computer science and information technology industry because of its performance, security, accessibility, low cost and many other amenities. Cloud security is a multifaceted and highly complex issue. Today security is main issue in cloud. All industry is moving toward cloud computing so security of data on cloud is essential so different security algorithm (like DES, AES, RSA etc.) has been implemented. The cloud computing model revolves around three functional units or components like Cloud Service Provider (manages Cloud Storage Server), Client/Owner (for data maintenance and computation) and User (registered with the owner and uses the data of owner stored on the cloud.)In this paper, we consider to realize efficient and secure data sharing in proposed cloud, that is, a trusted private cloud and a public cloud are assumed in our system. Data security is major issue prevailing in world of cloud computing and to overcome that issue the model has been proposed. Proposed model has been organized using HMAC algorithm that it give throughout data security in cloud computing at different levels. The model is highly secure and protects the data during transit as well as data at rest. It also secures the data against all threats i.e. insight as well as outsight.
Authors and Affiliations
Anamika Sirohi, Vishal Shrivastava
Design of Smart Electric Meter Based on IOT
in this growing modern world everything has been under the influence of internet but the process of monitoring electric meter reading is still a manual process which drains most of the human power resulting in less accu...
Performing Adaptive Channel Equalization by Hybrid Differential Evolution Particle Swarm Optimization
Inter symbol interference is the main obstacles for reliable communications. To mitigate the effects of ISI and to obtain reliable data transmission, An adaptive equalizer is required at the receiver. Equalizer is used...
Bike Sharing & Rental System: An Android Application
Bike sharing systems offer a low cost and environmentally friendly mean of transportation for short travels. It can also be used as a complementary mode to other public transit such as buses, local trains. Bike sharing...
Face Image Retrieval Techniques : A Survey
Due to popularity of digital devices, there are largely growing photos available in our life. Among them, a big percentage of are photos with human faces. Face image retrieval is an enabling technique to retrieve face i...
A Novel Secure Image Transmission Algorithm Using Reversible Color Transformations
A secure image transmission strategy is proposed, which changes consequently a given substantial volume mystery images into a purported mystery piece unmistakable mosaic images of the same size. The mosaic images, which...