slugPrivacy Protection of User’s Data in Cloud Storage Against External Auditors Attacks
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 4
Abstract
Cloud computing is the delivery of computing services over the Internet. It supports remote accessing of resources. The physical existence of users using data in cloud is very less. The data integrity is a challenging issue of data in cloud. The user’s data privacy and preserving in cloud can be introduced by third party auditing system. Extensive security and performance analysis gives good security and highly efficient. Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. Thus, enabling public auditability for cloud storage is of critical importance so that users can resort to a third party auditor to check the integrity of outsourced data and be worry-free.
Authors and Affiliations
B Kumara Swamy, Errolla Venkataiah, A. V. S. M AdiSeshu
Hybrid SWIPER: Synchronization of IP and MAC address to overcome third party attacks in cloud
In a third-party Cloud model, provider delivers the cloud service over the Internet. Public cloud services are sold ondemand, typically by the minute or the hour. Customers only pay for the CPU cycles, storage or bandwid...
Effects of the Addition of Pistachio Shell Particles on the Properties of Polyurethane Matrix Composite
In this research, a composite material-based polyurethane matrix with natural resources is prepared via the casting method and the effects of the weight fractions (2.5-12.5) wt% of pistachio shell particles on the prope...
Two Level Authentication System Based on Pair Based Authentication and Image Selection
This paper presents a two level authentication using pair based authentication and image selection. The most common method for authentication is textual passwords. Though textual passwords are easy to remember, they are...
Security Problems and Their Defenses in TCP/IP Protocol Suite
The Transmission Control Protocol/Internet Protocol (TCP/IP) is combination of different protocols at various layers.TCP/IP is the basic communication language or protocol of the Internet and private networks either an...
Finite Element Analysis of Kevlar Reinforced Rubber as Seismic Isolator
The seismic isolators are one of the modern innovative solution for building protection against the seismic behaviour of earth. Using the scope of composite materials we can create better solution for engineering proble...