CFP last date
20 May 2024
Reseach Article

Cloud Data Security While using Third Party Auditor

by Ashish Bhagat, Ravi Kant Sahu
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 70 - Number 16
Year of Publication: 2013
Authors: Ashish Bhagat, Ravi Kant Sahu
10.5120/12149-7798

Ashish Bhagat, Ravi Kant Sahu . Cloud Data Security While using Third Party Auditor. International Journal of Computer Applications. 70, 16 ( May 2013), 9-13. DOI=10.5120/12149-7798

@article{ 10.5120/12149-7798,
author = { Ashish Bhagat, Ravi Kant Sahu },
title = { Cloud Data Security While using Third Party Auditor },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 70 },
number = { 16 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 9-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume70/number16/12149-7798/ },
doi = { 10.5120/12149-7798 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:33:00.407769+05:30
%A Ashish Bhagat
%A Ravi Kant Sahu
%T Cloud Data Security While using Third Party Auditor
%J International Journal of Computer Applications
%@ 0975-8887
%V 70
%N 16
%P 9-13
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper the computing resources in the form of service rather than a utilities and product are provided to users over internet. The corporate world there are huge number of client which is accessing there data and modifying the data. The cloud is a platform where the data owner remotely stores their data in cloud. The goal of cloud computing concept is to secure and protect the data which come under the property of users and security of cloud computing environment is exclusive research area into which requires further development from both academic and research communities. The cloud application and services move to centralized huge data center and services and management of this data may not be trustable into cloud environment the computing resources are under control of service provider and the third-party-auditor ensures the data integrity over out sourced data. Third-party-auditor not only read but also may be change the data. Hence a mechanism should be provided who solved the problem. 1st the examines the problem contradiction between client CSP new potential securities schemes used to solve problem. the purpose of this paper is attempted to bring greater clarity landscape about cloud computing security and their solution at user level using encryption which ensure the data owner and client that there data are intact using algorithm. .

References
  1. Elsenpeter Robert ,Anthony T. Velte and Toby J. Velte, 2010. Cloud Computing A Practical Approach.
  2. Qian Wang and Cong Wang and Kui Ren, Wenjing Lou, Jin Li 2011. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing in IEEE transactions on parallel and distributed systems volume 22, no. 5.
  3. Cong Wang and Kui Ren and Wenjing Lou and Jin Li, 2010. To ward Publicly Auditable Secure Cloud Data Storage Services in IEEE.
  4. M. Ashah and R. Swaminathan and M. Baker, 2011. Privacy-Preserving Audit And Extraction of Digital Contents".
  5. H. Shacham and B. Waters, 2008. Compact Proofs of Retrivability in proc. of asiascrypt.
  6. Ravi Kant Sahu and Abhishek Mohta, L. K. Awasthi 2012. Robust Data Integration While Using Third Party Auditor For Cloud Data Storage Services, conf. IJARCSSE, Vol 2, Issue 2,ISSN: 2277 128X.
  7. P. Mell and t. Grance 2009. Draft Nist Working Definition of Cloud Computing, referred.
  8. Elinor Mills,2009. Cloud Computing Security Forecast: Clear Skies"
Index Terms

Computer Science
Information Sciences

Keywords

Data Integrity Third party Auditor Cloud Service Provider