TPA Based Cloud Storage Security Techniques

Provided by: International Journal of Advanced Research in Computer Engineering & Technology
Topic: Cloud
Format: PDF
Cloud Computing is the new trend to reduce the investment in business to satisfy the client needs using internet. The various cloud services provides infrastructure, software and platform. In cloud computing, data is moved to a remote location. Users store their data conscientiously in the cloud and return back when it is needed. But there is no assurance for the data stored in the cloud is secure and not changed by the cloud or Third Party Auditor (TPA).Users should be able to assist the TPA to overcome the integrity problems in cloud. In this paper, an enhanced method for securing the TPA by using Keyed Hash Message Authentication Code (HMAC) is proposed.

Find By Topic