Data Auditing in Cloud Environment using Message Authentication Code
نویسنده
چکیده
Cloud computing can be defined as a platform which provides different users an opportunity to store their data in the cloud. This data can be retrieved by any of the users or the service provider of that cloud. Data integrity is one of the major aspects of cloud computing services that prevails in a cloud environment. A cloud user needs to consider about data integrity apart from the confidentiality of data , that is data is not modified or corrupted by the service provider or other users. In this paper, we are going to propose a method to ensure data integrity in cloud environment. We will assure that the data in the cloud has not been altered by using Message Authentication Code (MAC). General Terms Security Management, Auditing, Cryptography and Data Integrity
منابع مشابه
Data Protection in Cloud Computing Using QR Code
Data protection in outsourced data is challenging task in cloud computing. In cloud environment the critical data should be masked or encrypted. This paper suggests QR code , a two dimensional code with RSA based homomorphic Algorithm can be used for secure authentication between client and server at the time of storage and auditing .Which is authenticate the client with encrypted split file co...
متن کاملRESCUE: Reputation based Service for Cloud User Environment
Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...
متن کاملPrivacy Preserving Public Auditing for Secured Data Storage in Cloud Using Block Authentication Code
Using cloud storage, users can remotely store their data, ondemand high-quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. Users no longer have physical possession of the outsourced data makes the data integrity protection in cloud computing for users with constrained computing resources. Users shou...
متن کاملA Survey on Cloud Computing System Using Provable Multicopy with Dynamically Fragmented Data
Distributed data to a remote Cloud Service Provider is a flourishing trend for infinite customers and institution relieve the difficulty of local data storage and maintenance. Moreover the customer gets confidence on the data mirroring provided by the CSP. The structure used for data mirroring can be different based on the data; more facsimile(copies) are demanded for derogatory data which cann...
متن کاملAn Efficient Privacy Preserving Public Auditing Mechanism for Secure Cloud Storage
one of the services provided by the cloud environment is cloud storage which allows users to store, remotely manage and access their data over the internet. However, the limited control granted to users over remote cloud nodes makes users worry about the integrity of their data as the user’ data can be accessed or modified by external attackers. Therefore, a new terminology called data auditing...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012