TPA BASED CLOUD STORAGE SECURITY TECHNIQUES
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 8
Abstract
Cloud Computing is the new trend to reduce the investment in business to satisfy the client needs using internet. The various cloud services provides infrastructure, software and platform. In cloud computing, data is moved to a remote location. Users store their data conscientiously in the cloud and return back when it is needed. But there is no assurance for the data stored in the cloud is secure and not changed by the cloud or Third Party Auditor (TPA).Users should be able to assist the TPA to overcome the integrity problems in cloud. In this paper, an enhanced method for securing the TPA by using Keyed Hash Message Authentication Code (HMAC) is proposed.
Authors and Affiliations
Anupriya. A. S , S. Ananthi, , S. Karthik,
Cluster Based Energy Efficient Sensory Data Collection With Mobile Sink
Wireless sensor network energy efficiency is the important factor of the network lifetime, most of the sensor nodes are present in an isolated urban fields to sensing the data in particular area .These sensor nodes...
Low and mid-level features for target detection in satellite images
Reliably detecting objects in broadarea overhead or satellite images has become an increasingly pressing need, as the capabilities for image acquisition are growing rapidly. The problem is particularly difficult in...
Radix -4/-8 Dual Encoder Block for Multiplier Architecture using GDI Technique
A hybrid radix-4/-8 multiplier is proposed for portable multimedia applications that demand high speed and low energy operation. Depending on the input pattern, the multiplier operates in the radix-8 mode in 56% of...
Assessing Quality of Software Service at Selection Time Using Evolutionary Algorithm
The integration of external software in project development can be challenging and risky, because as the execution quality of the external software and the trustworthiness of the software is unknown during integrat...
Data Mining: Estimation of Missing Values Using Lagrange Interpolation Technique
In the real world Most of the datasets have missing data. The presence of missing values in a dataset can affect the performance of Mining Algorithms. In this paper we are using Lagrange interpolation method for predicti...