Secure Auditing in Cloud

Cloud computing has been imagined as the cutting edge building design of big business IT. Lamentably, the integrity of cloud information is liable to issues because of the presence of programming disappointments and human lapses. The data should be kept confidential and should be kept private to the public verifier. The authors extend this architecture by introducing consistency as well as security. They introduce a hybrid encryption algorithm to effectively encrypt the data files of users in cloud server. The hybrid algorithm supports the data confidentiality, privacy preserving of data. Together with this, system supports data sharing by maintaining consistency.

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Resource Details

Provided by:
International Journal for Innovative Research in Science and Technology (IJIRST)
Topic:
Security
Format:
PDF