Provided by: University College of Dublin
Date Added: Aug 2012
Cloud, being the most vulnerable next generation architecture consists of two major design elements i.e. the cloud service provider and the client. The architecture shifts data, applications and development environments to large data centers thereby providing storage, software and platform services online. The notion on verifying data for intactness is termed as data auditing and the process is carried out by the client or by a third party auditor delegated by the client. The delegation model lessen client's overhead but may not be fully trustworthy since the third party has direct access to client's private data. The third party auditing brings in many new security challenges, and one among those is untrusted TPA.