TPA BASED CLOUD STORAGE SECURITY TECHNIQUES  

Abstract

Cloud Computing is the new trend to reduce the investment in business to satisfy the client needs using internet. The various cloud services provides infrastructure, software and platform. In cloud computing, data is moved to a remote location. Users store their data conscientiously in the cloud and return back when it is needed. But there is no assurance for the data stored in the cloud is secure and not changed by the cloud or Third Party Auditor (TPA).Users should be able to assist the TPA to overcome the integrity problems in cloud. In this paper, an enhanced method for securing the TPA by using Keyed Hash Message Authentication Code (HMAC) is proposed.  

Authors and Affiliations

Anupriya. A. S , S. Ananthi, , S. Karthik,

Keywords

Related Articles

ICCC: Information Correctness to the Customers in Cloud Data Storage 

Cloud storage is the only solution to the IT organizations to optimize the escalating storage costs and maintenance. Data outsourcing in to the cloud has become today trending environment for the thin organizations. The...

Spectrum of Cyber threats & Available Control Mechanisms  

The Internet is undoubtedly the largest public data network enabling and facilitating both personal & business communications worldwide. Wireless networking has experienced a tremendous growth becoming an integral...

An Approach for Storage Security in Cloud Computing- A Survey 

The many advantages of cloud computing are increasingly attracting individuals and organizations to outsource their data from local to remote cloud servers. In addition to cloud infrastructure and platform provider...

Public-Key Infrastructure (PKI

This paper presents a survey on Public-Key Infrastructure (PKI). This discussion is centered on overview of public-key infrastructure, its key elements, PKI management functions, protocols, digital certificate format...

Image Denoising using Dual-Tree Complex DWT and Double-Density Dual-Tree Complex DWT  

Non-stationary signal processing applications use standard non-redundant DWT (Discrete Wavelet Transform) which is very powerful tool. But it suffers from shift sensitivity, absence of phase information, and poor directi...

Download PDF file
  • EP ID EP162047
  • DOI -
  • Views 140
  • Downloads 0

How To Cite

Anupriya. A. S, S. Ananthi, , S. Karthik, (2012). TPA BASED CLOUD STORAGE SECURITY TECHNIQUES  . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 1(8), 194-197. https://europub.co.uk/articles/-A-162047