TPA BASED CLOUD STORAGE SECURITY TECHNIQUES
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 8
Abstract
Cloud Computing is the new trend to reduce the investment in business to satisfy the client needs using internet. The various cloud services provides infrastructure, software and platform. In cloud computing, data is moved to a remote location. Users store their data conscientiously in the cloud and return back when it is needed. But there is no assurance for the data stored in the cloud is secure and not changed by the cloud or Third Party Auditor (TPA).Users should be able to assist the TPA to overcome the integrity problems in cloud. In this paper, an enhanced method for securing the TPA by using Keyed Hash Message Authentication Code (HMAC) is proposed.
Authors and Affiliations
Anupriya. A. S , S. Ananthi, , S. Karthik,
Design of Least Complex S-Box and its Fault Detection for Robust AES Algorithm
Advanced Encryption Standard (AES) is the symmetric key standard for encryption and decryption. In this work, a 128-bit AES encryption and decryption using Rijndael Algorithm is designed and synthesized using veril...
DATA STORAGE SECURITY IN CLOUD BY USING JAR FILES AND HIERARCHICAL ID-BASED CRYPTOGRAPHY
Cloud computing is one of the most modern research areas due to its ability to decrease costs coupled with computing while growing scalability and flexibility for computing services. Cloud computing is one of the gre...
Comparative Study of Two-way Finite Automata and Turing machine
Two-way finite Automata are termed as read only Turing machine. Two way finite automata is one of variant of Turing machine, which is blessed with an infinite tape, and could be used by tape head to read or write i...
Generation of Electricity by Renewable Energy Sources & Transmission of Energy Production Units using PLC & SCADA
ABSTRACTAutomation means Delegation of human control to machine. A PLC (Programmable Logic Controller) is a device that was invented to replace the necessary sequential relay circuits for machine control. A SCADA (S...
Preserving Privacy Using Data Perturbation in Data Stream
Data stream can be conceived as a continuous and changing sequence of data that continuously arrive at a system to store or process. Examples of data streams include computer network traffic, phone conversations, web sea...