Data Auditing in Cloud Environment using Message Authentication Code

نویسنده

  • K. Govinda
چکیده

Cloud computing can be defined as a platform which provides different users an opportunity to store their data in the cloud. This data can be retrieved by any of the users or the service provider of that cloud. Data integrity is one of the major aspects of cloud computing services that prevails in a cloud environment. A cloud user needs to consider about data integrity apart from the confidentiality of data , that is data is not modified or corrupted by the service provider or other users. In this paper, we are going to propose a method to ensure data integrity in cloud environment. We will assure that the data in the cloud has not been altered by using Message Authentication Code (MAC). General Terms Security Management, Auditing, Cryptography and Data Integrity

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Data Protection in Cloud Computing Using QR Code

Data protection in outsourced data is challenging task in cloud computing. In cloud environment the critical data should be masked or encrypted. This paper suggests QR code , a two dimensional code with RSA based homomorphic Algorithm can be used for secure authentication between client and server at the time of storage and auditing .Which is authenticate the client with encrypted split file co...

متن کامل

RESCUE: Reputation based Service for Cloud User Environment

Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...

متن کامل

Privacy Preserving Public Auditing for Secured Data Storage in Cloud Using Block Authentication Code

Using cloud storage, users can remotely store their data, ondemand high-quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. Users no longer have physical possession of the outsourced data makes the data integrity protection in cloud computing for users with constrained computing resources. Users shou...

متن کامل

A Survey on Cloud Computing System Using Provable Multicopy with Dynamically Fragmented Data

Distributed data to a remote Cloud Service Provider is a flourishing trend for infinite customers and institution relieve the difficulty of local data storage and maintenance. Moreover the customer gets confidence on the data mirroring provided by the CSP. The structure used for data mirroring can be different based on the data; more facsimile(copies) are demanded for derogatory data which cann...

متن کامل

An Efficient Privacy Preserving Public Auditing Mechanism for Secure Cloud Storage

one of the services provided by the cloud environment is cloud storage which allows users to store, remotely manage and access their data over the internet. However, the limited control granted to users over remote cloud nodes makes users worry about the integrity of their data as the user’ data can be accessed or modified by external attackers. Therefore, a new terminology called data auditing...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012