z-logo
open-access-imgOpen Access
Privacy Preserving in TPA using Secured Encryption Technique for Secure Cloud
Author(s) -
Reshu Tomar,
Rajkumar Singh
Publication year - 2016
Publication title -
international journal of computer applications
Language(s) - English
Resource type - Journals
ISSN - 0975-8887
DOI - 10.5120/ijca2016909011
Subject(s) - computer science , encryption , computer security , cloud computing , computer network , operating system
Cloud computing is a model for enabling everywhere, welllocated, on-demand network access to a shared pool of compo sable computing resources (e.g., servers, networks, applications, and services). Mainly users can digress the support and maintenance of IT services to cloud service providers which is expert in providing knowledge and also maintains the vast amount of IT resources. Just like a doublebladed sword, cloud computing also brings in many new security challenges to ensure the protection of confidentiality and to preserve the integrity of users data in the cloud. To resolve these problems, this work uses the technique of secret key based symmetric key cryptography which enables TPA to perform the auditing task without demanding the local copy of user’s stored data and thus severely reduces the computation and transmission overhead as compare to simple, straightforward data auditing approaches. Thereby integrating the encryption with hashing, this work guarantees that the TPA could not learn any knowledge about the data content that is store in the cloud server during the auditing process.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom