Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage
Journal: International Journal of Computer Science and Mobile Applications IJCSMA (Vol.2, No. 1)Publication Date: 2014-01-30
Authors : P. Selvigrija D. Sumithra;
Page : 1-8
Keywords : 3-D password; Automatic protocol blocker; third party auditing; Audit;
Abstract
Using cloud storage, users can remotely store their data and enjoy the on-demand highquality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. However, the fact that users no longer have physical possession of the outsourced data makes the data integrity protection in cloud computing a formidable task, especially for users with constrained computing resources. Moreover, users should be able to just use the cloud storage as if it is local, without worrying about the need to verify its integrity. Thus, enabling public auditability for cloud storage is of critical importance so that users can resort to a third-party auditor (TPA) to check the integrity of outsourced data and be worry free. To securely introduce an effective TPA, the auditing process should bring in no new vulnerabilities toward user data privacy, and introduce no additional online burden to user. User level security is provided using the 3-D Password by combining textual, graphical and Biometric Finger print. For data level security symmetric key based encryption/decryption using Galois Counter Mode (GCM).
Other Latest Articles
- Density-Based Multi Feature Background Subtraction with Support Vector Machine
- An Efficient Methodology for Detecting Spam Using Spot System
- Analysis of financial state by neural networks
- Equipment's technological flexibility influence on processing of parts
- Features presentation and evaluation of concepts in problems of cognitive modeling
Last modified: 2014-01-11 00:12:00