A Secure & Efficient Data Integrity Model to Establish Trust in Cloud Computing using TPA

Cloud computing comes into focus only when the people think about what IT always needs: a way to increase capacity or add capabilities on the fly without investing in new infrastructure, licensing new software. Besides of this advantage there is one major problem the user have to face while keeping their private data in cloud, assurance of their data will remain unaffected by external as well as internal threat and security are major concerns as there are chances for CSP to behave unfaithfully with users regarding the status of their outsourced data.

Subscribe to the Data Insider Newsletter

Learn the latest news and best practices about data science, big data analytics, artificial intelligence, data security, and more. Delivered Mondays and Thursdays

Subscribe to the Data Insider Newsletter

Learn the latest news and best practices about data science, big data analytics, artificial intelligence, data security, and more. Delivered Mondays and Thursdays

Resource Details

Provided by:
International Research Journal of Computer Science (IRJCS)
Topic:
Data Management
Format:
PDF