Auditing Mechanisms for Outsourced Cloud Storage?
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 8)Publication Date: 2014-08-30
Authors : J.Aparna; R.Sathiyaraj;
Page : 219-229
Keywords : Data storage; privacy-preserving; public audit ability; cryptographic protocols; cloud computing;
Abstract
As we know that most of the firms are shown interested to place their data in a cloud based networks because of its utilities and problems with traditional data storage tools. If we are storing data outside of its environment means outsourced it leads to privacy issues. Also considerable factor is that security here users worried about integrity and accountability. Security is a considerable issue for this type of data centers. Security consist set of policies, applications and infrastructure. In this article we propose a model to overcome these issues; Outsourced data are verified by trusted third party persons to ensure its integrity. This auditing was done because most of the data are outsourced. Next focused on security and performance analysis issues this was done by auditors simultaneously without over burden to the users.
Other Latest Articles
Last modified: 2014-08-17 19:55:25