To Analysis the Data Security in Cloud Computing At User, Cloud Server and Third Party Level Using HMAC
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 12
Abstract
Cloud computing is an upcoming uprising in computer science and information technology industry because of its performance, security, accessibility, low cost and many other amenities. Cloud security is a multifaceted and highly complex issue. Today security is main issue in cloud. All industry is moving toward cloud computing so security of data on cloud is essential so different security algorithm (like DES, AES, RSA etc.) has been implemented. The cloud computing model revolves around three functional units or components like Cloud Service Provider (manages Cloud Storage Server), Client/Owner (for data maintenance and computation) and User (registered with the owner and uses the data of owner stored on the cloud.)In this paper, we consider to realize efficient and secure data sharing in proposed cloud, that is, a trusted private cloud and a public cloud are assumed in our system. Data security is major issue prevailing in world of cloud computing and to overcome that issue the model has been proposed. Proposed model has been organized using HMAC algorithm that it give throughout data security in cloud computing at different levels. The model is highly secure and protects the data during transit as well as data at rest. It also secures the data against all threats i.e. insight as well as outsight.
Authors and Affiliations
Anamika Sirohi, Vishal Shrivastava
Anaerobic digestion of Municipal Solid biodegradable wastes for methane production:A Review
The untreated and undisposed municipal solid waste generated through different sources is a major concern of the world now-a-days. There are millions of tonnes of municipal solid waste produced every year and the amount...
Automatic Microbiological Stainer
Most of the research work is being focused on providing automation in all domains especially in the field of medical. This research paper focuses on replacing the manual work in the clinical laboratories for the process...
A New Technique to Obtain Initial Basic Feasible Solution for the Transportation Problem
The SS method is a direct method proposed for deriving an initial solution towards transportation problem. This method solves the problem initially. Herewith in this research paper, a transportation matrix is reduced by...
Analysis on Security Evaluation of Pattern Classifiers under Attack
Analysis on security evaluation of pattern classifiers under attack describes pattern classification systems that are security evaluation problems because of different attacks. Pattern Classification commonly used in ad...
Special pairs of rectangles and sphenic number
We present pairs of Rectangles, such that in each pair, the sum of their areas is two times the Sphenic number minus one. Also we present the number of pairs of primitive and non-primitive rectangles.