To Analysis the Data Security in Cloud Computing At User, Cloud Server and Third Party Level Using HMAC
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 12
Abstract
Cloud computing is an upcoming uprising in computer science and information technology industry because of its performance, security, accessibility, low cost and many other amenities. Cloud security is a multifaceted and highly complex issue. Today security is main issue in cloud. All industry is moving toward cloud computing so security of data on cloud is essential so different security algorithm (like DES, AES, RSA etc.) has been implemented. The cloud computing model revolves around three functional units or components like Cloud Service Provider (manages Cloud Storage Server), Client/Owner (for data maintenance and computation) and User (registered with the owner and uses the data of owner stored on the cloud.)In this paper, we consider to realize efficient and secure data sharing in proposed cloud, that is, a trusted private cloud and a public cloud are assumed in our system. Data security is major issue prevailing in world of cloud computing and to overcome that issue the model has been proposed. Proposed model has been organized using HMAC algorithm that it give throughout data security in cloud computing at different levels. The model is highly secure and protects the data during transit as well as data at rest. It also secures the data against all threats i.e. insight as well as outsight.
Authors and Affiliations
Anamika Sirohi, Vishal Shrivastava
Combined Approach for Video Shot Boundary Detection with Monoslam and Image Quality Based Features
The use of three dimensional information from video is rare in the video analysis literature due to the inherent difficulties of extracting accurate 3D measurements from a single view of a scene. Several methods have be...
A Novel Design of Low Power Comparator through Differential Amplifier in 90nm CMOS Technology Using Cadence Tool
In digital world, Speed, area, power are very vital parameters for high speed devices like analog to digital converters. The comparator circuit with preamplifier increases the power consumption, as it requires large amo...
Optimization of machining parameters in wire electrical discharge machine process by combination of genetic algorithm and artificial neural network
Wire electrical discharge machining (WEDM) has become an important non-traditional machining process. Wire Electrical discharge machining (WEDM) process, at present is still an experience process, wherein selected param...
Analysis of Compressive Strength of Low Volume Fly Ash Concrete
Fly ash is a major by-product of thermal power plant, the alternative option for its disposal was to use it in building materials. Incorporation of fly ash in concrete specimen has shown enhancement in properties of con...
slugAutomatic Message Sender—An Application For Android
Android is an operating system for smart phones developed by Google Inc and the Open Handset Alliance (OHA).This era is surrounded by technology. The smart phones has so much of capabilities. This paper deals with the...