A Proficient Model for High End Security in Cloud Computing
Journal: ICTACT Journal on Soft Computing (IJSC) (Vol.4, No. 2)Publication Date: 2014-01-01
Authors : R. Bala Chandar M. S. Kavitha; K. Seenivasan;
Page : 697-702
Keywords : Data Security; Data Correctness; Data Control; Access Control; Data Integrity;
Abstract
Cloud computing is an inspiring technology due to its abilities like ensuring scalable services, reducing the anxiety of local hardware and software management associated with computing while increasing flexibility and scalability. A key trait of the cloud services is remotely processing of data. Even though this technology had offered a lot of services, there are a few concerns such as misbehavior of server side stored data , out of control of data owner's data and cloud computing does not control the access of outsourced data desired by the data owner. To handle these issues, we propose a new model to ensure the data correctness for assurance of stored data, distributed accountability for authentication and efficient access control of outsourced data for authorization. This model strengthens the correctness of data and helps to achieve the cloud data integrity, supports data owner to have control on their own data through tracking and improves the access control of outsourced data.
Other Latest Articles
- Web Content Extraction Using Hybrid Approach
- Cat Swarm Optimization for Single Stage Supply Chain Distribution System with Fixed Charges
- Real-Time Intelligent Multilayer Attack Classification System
- PATH LOSS PREDICTION FOR GSM MOBILE NETWORKS FOR URBAN REGION OF ABA, SOUTH-EAST NIGERIA?
- The system approach and development of cybernetic representations
Last modified: 2014-02-18 18:17:35