ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Proficient Model for High End Security in Cloud Computing

Journal: ICTACT Journal on Soft Computing (IJSC) (Vol.4, No. 2)

Publication Date:

Authors : ; ;

Page : 697-702

Keywords : Data Security; Data Correctness; Data Control; Access Control; Data Integrity;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Cloud computing is an inspiring technology due to its abilities like ensuring scalable services, reducing the anxiety of local hardware and software management associated with computing while increasing flexibility and scalability. A key trait of the cloud services is remotely processing of data. Even though this technology had offered a lot of services, there are a few concerns such as misbehavior of server side stored data , out of control of data owner's data and cloud computing does not control the access of outsourced data desired by the data owner. To handle these issues, we propose a new model to ensure the data correctness for assurance of stored data, distributed accountability for authentication and efficient access control of outsourced data for authorization. This model strengthens the correctness of data and helps to achieve the cloud data integrity, supports data owner to have control on their own data through tracking and improves the access control of outsourced data.

Last modified: 2014-02-18 18:17:35