Download Now Free registration required
Cloud computing provides the facility to access shared resources and common infrastructure, offering services on demand over the network to perform operations that meet changing business needs. The location of physical resources and devices being accessed are typically not known to the end user. It also provides facilities for users to develop, deploy and manage their applications 'on the cloud', which entails virtualization of resources that maintains and manages itself. Confidentiality, Integrity, Authenticity and Privacy are essential concerns for both Cloud Service Providers and consumers as well. This paper proposes a scheme for enhancing the data authenticity, privacy and integrity of cloud data with the aid of an encryption scheme and a hash function which uses message digest.
- Format: PDF
- Size: 1102.2 KB