TPA BASED CLOUD STORAGE SECURITY TECHNIQUES  

Abstract

Cloud Computing is the new trend to reduce the investment in business to satisfy the client needs using internet. The various cloud services provides infrastructure, software and platform. In cloud computing, data is moved to a remote location. Users store their data conscientiously in the cloud and return back when it is needed. But there is no assurance for the data stored in the cloud is secure and not changed by the cloud or Third Party Auditor (TPA).Users should be able to assist the TPA to overcome the integrity problems in cloud. In this paper, an enhanced method for securing the TPA by using Keyed Hash Message Authentication Code (HMAC) is proposed.  

Authors and Affiliations

Anupriya. A. S , S. Ananthi, , S. Karthik,

Keywords

Related Articles

AN EFFECTIVE METHODOLOGY FOR MINUTIAE BASED FINGERPRINT MATCHING USING SINGULARITIES INDEXING 

Fingerprint is one of the most significant and traditional biometric trait and its uniqueness are exclusively determined by the local ridge characteristics and their relationships. However, in existing system,...

AN EXTENSIVE REVIEW OF CURRENT TRENDS IN STEGANALYSIS  

Steganography refers to the art of secret communication while steganalysis is the art and science of detection of the presence of steganography. Both steganography and steganalysis received a great deal of attent...

BER PERFORMANCE OF GMSK USING MATLAB  

— GMSK is most prominent standards around the world. Global System for Mobile communication (GSM), Digital European Cordless Telephone (DECT), Cellular Digital Packet Data (CDPD), Digital communications system in t...

DISCRIMINATION OF HEART RATE VARIABILITY USING DECISION TREES AND MLP NETWORKS 

The main objective of the paper is to analyze the heart rate variability (HRV) of various subjects. The ECG signals collected from the public data base is Categorized using the Classification and Regression Tree...

Modulation of Generalized Canonical CS-Transform  

In this paper the generalized canonical CS- transform it is extended to the distribution of compact support by using kernel method. The analyticity and modulation theorems are proved for this transform. Also...

Download PDF file
  • EP ID EP162047
  • DOI -
  • Views 130
  • Downloads 0

How To Cite

Anupriya. A. S, S. Ananthi, , S. Karthik, (2012). TPA BASED CLOUD STORAGE SECURITY TECHNIQUES  . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 1(8), 194-197. https://europub.co.uk/articles/-A-162047