Monitoring Data Integrity while using TPA in Cloud Environment

Authors

  • k khushi

  • Jasmeet Singh

Keywords:

audit, cloud, integrity, station to station protocol, SHA-2, third party auditor, XOR

Abstract

Cloud Computing is the arising technology that delivers software, platform and infrastructure as a service over a network. Cloud minimizes the burden of users by allowing them to remotely store their data and eliminates the need of local storage and maintenance. Even though benefits are higher but while storing data in cloud, correctness of data and security are major concerns as there are many chances for CSP to behave unfaithfully towards users regarding the status of their outsourced data. In order to overcome the threat of integrity, user can entrust third party auditor to assess the risk of outsourced data when needed .For this, in our proposed scheme we are using SHA-2 which is cryptographic hash function to verify integrity of data along with XOR mechanism, Station-to-Station key protocol for key generation and mutual authentication with TPA.

How to Cite

k khushi, & Jasmeet Singh. (2013). Monitoring Data Integrity while using TPA in Cloud Environment. Global Journal of Computer Science and Technology, 13(B3), 19–23. Retrieved from https://computerresearch.org/index.php/computer/article/view/199

Monitoring Data Integrity while using TPA in Cloud Environment

Published

2013-07-15