TPA BASED CLOUD STORAGE SECURITY TECHNIQUES
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 8
Abstract
Cloud Computing is the new trend to reduce the investment in business to satisfy the client needs using internet. The various cloud services provides infrastructure, software and platform. In cloud computing, data is moved to a remote location. Users store their data conscientiously in the cloud and return back when it is needed. But there is no assurance for the data stored in the cloud is secure and not changed by the cloud or Third Party Auditor (TPA).Users should be able to assist the TPA to overcome the integrity problems in cloud. In this paper, an enhanced method for securing the TPA by using Keyed Hash Message Authentication Code (HMAC) is proposed.
Authors and Affiliations
Anupriya. A. S , S. Ananthi, , S. Karthik,
ICCC: Information Correctness to the Customers in Cloud Data Storage
Cloud storage is the only solution to the IT organizations to optimize the escalating storage costs and maintenance. Data outsourcing in to the cloud has become today trending environment for the thin organizations. The...
Spectrum of Cyber threats & Available Control Mechanisms
The Internet is undoubtedly the largest public data network enabling and facilitating both personal & business communications worldwide. Wireless networking has experienced a tremendous growth becoming an integral...
An Approach for Storage Security in Cloud Computing- A Survey
The many advantages of cloud computing are increasingly attracting individuals and organizations to outsource their data from local to remote cloud servers. In addition to cloud infrastructure and platform provider...
Public-Key Infrastructure (PKI
This paper presents a survey on Public-Key Infrastructure (PKI). This discussion is centered on overview of public-key infrastructure, its key elements, PKI management functions, protocols, digital certificate format...
Image Denoising using Dual-Tree Complex DWT and Double-Density Dual-Tree Complex DWT
Non-stationary signal processing applications use standard non-redundant DWT (Discrete Wavelet Transform) which is very powerful tool. But it suffers from shift sensitivity, absence of phase information, and poor directi...