To Analysis the Data Security in Cloud Computing At User, Cloud Server and Third Party Level Using HMAC
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 12
Abstract
Cloud computing is an upcoming uprising in computer science and information technology industry because of its performance, security, accessibility, low cost and many other amenities. Cloud security is a multifaceted and highly complex issue. Today security is main issue in cloud. All industry is moving toward cloud computing so security of data on cloud is essential so different security algorithm (like DES, AES, RSA etc.) has been implemented. The cloud computing model revolves around three functional units or components like Cloud Service Provider (manages Cloud Storage Server), Client/Owner (for data maintenance and computation) and User (registered with the owner and uses the data of owner stored on the cloud.)In this paper, we consider to realize efficient and secure data sharing in proposed cloud, that is, a trusted private cloud and a public cloud are assumed in our system. Data security is major issue prevailing in world of cloud computing and to overcome that issue the model has been proposed. Proposed model has been organized using HMAC algorithm that it give throughout data security in cloud computing at different levels. The model is highly secure and protects the data during transit as well as data at rest. It also secures the data against all threats i.e. insight as well as outsight.
Authors and Affiliations
Anamika Sirohi, Vishal Shrivastava
Improving Security in Cloud Storage Using Eraser Code Techniques
To achieve a secure and dependable cloud storage service, a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasure-coded data. This allows users to audit the c...
Trade Of Between SSD and HDD
Energy, device endurance and Performance for storage systems are the trade-offs among them. Designs optimized for workload or one dimension often suffer from another. Therefore, it is necessary to study the trade-offs t...
Bending Stress Analysis of Spur Gear
Gears are widely used for the power and motion transmission in various systems. Gears are classified as spur, helical, bevel, worm etc. The spur gears are easy to manufacture and are used on parallel shafts. Spur gears...
IRIS Detection in Voting System
In this paper we are scanning individual’s iris and storing it in a voters database by giving appropriate AADHAR card no. If a person comes for voting then his or her iris is detected and this detected image is compared...
slugA Novel Approach for the Development of Metadata Editors in Web-based Applications
Metadata is the data about data which describes how and when particular data was collected and how the data should be formatted. Metadata Standards that support a number of defined functions, and specify elements which...