Monitoring Data Integrity while using TPA in Cloud Environment

نویسندگان

  • Jaspreet Kaur
  • Jasmeet Singh
چکیده

www.ijarcet.org 2236  Abstract— Cloud Computing is the arising technology that delivers software, platform and infrastructure as a service over a network. Cloud minimizes the burden of users by allowing them to remotely store their data and eliminates the need of local storage and maintenance. Even though benefits are higher but while storing data in cloud, correctness of data and security are major concerns as there are many chances for CSP to behave unfaithfully towards users regarding the status of their outsourced data. In order to overcome the threat of integrity, user can entrust third party auditor to assess the risk of outsourced data when needed .For this, in our proposed scheme we are using SHA-2 which is cryptographic hash function to verify integrity of data along with XOR mechanism, Station-to-Station key protocol for key generation and mutual authentication with TPA.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA

Cloud computing comes into focus only when we think about what IT always needs: A way to increase capacity or add capabilities on the fly without investing in new infrastructure, licensing new software. Besides of this advantage there is one major problem we have to face while keeping our private data in cloud, Assurance of our data will remain unaffected by external as well as internal threat ...

متن کامل

An Efficient Privacy Preserving Public Auditing Mechanism for Secure Cloud Storage

one of the services provided by the cloud environment is cloud storage which allows users to store, remotely manage and access their data over the internet. However, the limited control granted to users over remote cloud nodes makes users worry about the integrity of their data as the user’ data can be accessed or modified by external attackers. Therefore, a new terminology called data auditing...

متن کامل

An Efficient Auditing Protocol for Secure Data Storage in Cloud Computing

Cloud Computing is a type of distributed computing whereby resources and applications are shared over the internet. These applications are stored in one location and can be accessed in different location by any authorized users where the user does not need any infrastructure. In cloud storage, while outsourcing trust worthiness of the data is a scary task in cloud. To ensure the integrity of dy...

متن کامل

Improving Security and Integrity of Data Storage in Cloud Computing By Using Homomorphic Authentication technique

as we seen that, today’s generation of IT has widely use the cloud computing services, that means in future cloud computing will important part of IT enterprise. In which the application software and databases are stored at centralized large data storage. Now in cloud data center, management of data & services may not be fully trustworthy. This new phenomenon brings many security challenges. Th...

متن کامل

Record Maintenance and Secure Preserving Of Shared Data in Public Auditing

Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. However, the fact that users no longer have physical possession of the outsourced data makes the data integrity protection in Cloud Computing a formidable task, es...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013