Monitoring Data Integrity while using TPA in Cloud Environment
Monitoring Data Integrity while using TPA in Cloud Environment

Keywords

audit
cloud
integrity
station to station protocol
SHA-2
third party auditor
XOR

How to Cite

k khushi, & Jasmeet Singh. (2013). Monitoring Data Integrity while using TPA in Cloud Environment. Global Journal of Computer Science and Technology, 13(B3), 19–23. Retrieved from https://gjcst.com/index.php/gjcst/article/view/1500

Abstract

Cloud Computing is the arising technology that delivers software platform and infrastructure as a service over a network Cloud minimizes the burden of users by allowing them to remotely store their data and eliminates the need of local storage and maintenance Even though benefits are higher but while storing data in cloud correctness of data and security are major concerns as there are many chances for CSP to behave unfaithfully towards users regarding the status of their outsourced data In order to overcome the threat of integrity user can entrust third party auditor to assess the risk of outsourced data when needed For this in our proposed scheme we are using SHA-2 which is cryptographic hash function to verify integrity of data along with XOR mechanism Station-to-Station key protocol for key generation and mutual authentication with TPA
Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright (c) 2013 Authors and Global Journals Private Limited