ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Review on Privacy Preserving in TPA Using Secured Encryption Technique for Secure Cloud

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.6, No. 10)

Publication Date:

Authors : ; ;

Page : 83-89

Keywords : Cloud Computing; Public Auditing; Privacy Preserving; data storage; TPA; Security;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Computing is the new buzz word in today's computing world. Although there is huge buzz, many people are confused as to exactly what cloud computing is, especially as the term can be used to mean almost anything. Cloud Computing has been envisioned as the next generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data canters, where the management of the data and services may not be fully trustworthy. This unique paradigm brings about many new security challenges, which have not been well understood. This work studies the problem of ensuring the integrity of data storage in Cloud Computing. In particular, we consider the task of allowing a third party auditor (TPA), on behalf of the cloud client, to verify the integrity of the dynamic data stored in the cloud. To securely introduce an effective third party auditor (TPA), the following two fundamental requirements have to be met: 1) TPA should be able to efficiently audit the cloud data storage without demanding the local copy of data, and introduce no additional on-line burden to the cloud user; 2) the third party auditing process should bring in no new vulnerabilities towards user data privacy. In this paper, we use and interestingly join the Blowfish Algorithm to encryption and shielding of information to accomplish the privacy preserving open cloud information reviewing framework, which meets every single above necessity.

Last modified: 2018-01-08 21:10:17