To Analysis the Data Security in Cloud Computing At User, Cloud Server and Third Party Level Using HMAC

Abstract

Cloud computing is an upcoming uprising in computer science and information technology industry because of its performance, security, accessibility, low cost and many other amenities. Cloud security is a multifaceted and highly complex issue. Today security is main issue in cloud. All industry is moving toward cloud computing so security of data on cloud is essential so different security algorithm (like DES, AES, RSA etc.) has been implemented. The cloud computing model revolves around three functional units or components like Cloud Service Provider (manages Cloud Storage Server), Client/Owner (for data maintenance and computation) and User (registered with the owner and uses the data of owner stored on the cloud.)In this paper, we consider to realize efficient and secure data sharing in proposed cloud, that is, a trusted private cloud and a public cloud are assumed in our system. Data security is major issue prevailing in world of cloud computing and to overcome that issue the model has been proposed. Proposed model has been organized using HMAC algorithm that it give throughout data security in cloud computing at different levels. The model is highly secure and protects the data during transit as well as data at rest. It also secures the data against all threats i.e. insight as well as outsight.

Authors and Affiliations

Anamika Sirohi, Vishal Shrivastava

Keywords

Related Articles

Anaerobic digestion of Municipal Solid biodegradable wastes for methane production:A Review

The untreated and undisposed municipal solid waste generated through different sources is a major concern of the world now-a-days. There are millions of tonnes of municipal solid waste produced every year and the amount...

Automatic Microbiological Stainer

Most of the research work is being focused on providing automation in all domains especially in the field of medical. This research paper focuses on replacing the manual work in the clinical laboratories for the process...

A New Technique to Obtain Initial Basic Feasible Solution for the Transportation Problem

The SS method is a direct method proposed for deriving an initial solution towards transportation problem. This method solves the problem initially. Herewith in this research paper, a transportation matrix is reduced by...

Analysis on Security Evaluation of Pattern Classifiers under Attack

Analysis on security evaluation of pattern classifiers under attack describes pattern classification systems that are security evaluation problems because of different attacks. Pattern Classification commonly used in ad...

Special pairs of rectangles and sphenic number

We present pairs of Rectangles, such that in each pair, the sum of their areas is two times the Sphenic number minus one. Also we present the number of pairs of primitive and non-primitive rectangles.

Download PDF file
  • EP ID EP21494
  • DOI -
  • Views 429
  • Downloads 15

How To Cite

Anamika Sirohi, Vishal Shrivastava (2015). To Analysis the Data Security in Cloud Computing At User, Cloud Server and Third Party Level Using HMAC. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(12), -. https://europub.co.uk./articles/-A-21494