IDENTIFICATION OF MISBEHAVING CLOUD SERVER USING TOKEN COMPUTATION
Journal: IMPACT : International Journal of Research in Engineering & Technology ( IMPACT : IJRET ) (Vol.2, No. 3)Publication Date: 2014-03-31
Authors : J. KUMARAN ALLAMPATI RAKESH; PAWAR AJIT TANAJI;
Page : 69-72
Keywords : Cloud Storage; Computer Technology; Higher Degree of Structure;
Abstract
“Cloud computing” became the next generation of IT. The cloud is not simply the latest trendy term for the Internet. Though the Internet is a need for the cloud, the cloud is something more than the Internet. The cloud is where you go to use technology when you need it, for as long as you need it, and not a minute more. You do not install anything on your desktop, and you do not pay for the technology when you are not using it. The cloud can be both software and infrastructure. It can be an application you access through the Web or a server that you provision exactly when you need it. So, lot of people paid their attention towards this new era of IT. Automatically certain security problems will arouse, When the number of users using the cloud. They are either from the server of cloud or any attacker which had an interest to steal the users’ data. This paper provides a solution to identify the misbehaving and properly not working server using the token computation. It verifies the cloud server with the data which already distributed into the server data storage. The computed token checks the signature of the data in cloud data storage. Based on the result this scheme gives the authentication for the cloud data storage server weather it was working properly or not.
Other Latest Articles
- TO ENHANCE THE SECURITY IN DBMS USING INTEGRATED CRYPTOGRAPHIC ALGORITHMS?
- A MODEL FOR WEBSITE QUALITY EVALUATION - A PRACTICAL APPROACH
- THE MECHANICAL PROPERTIES OF DIFFERENT CULTIVARS DATES AT THREE MATURITY STAGES
- TO ENHANCE THE LIFETIME OF WIRELESS SENSOR NETWORK USING A NOVEL APPROACH BASED ON NEURAL NETWORK?
- SECURE ROUTING PROTOCOL IN SENSOR NETWORK FOR VAMPIRE ATTACK
Last modified: 2014-03-31 15:36:00