High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

A Third Party Auditor Based Technique for Cloud Security

Author(s):

Prof. Gajendra Singh , SSSIST Sehore; Dinesh Kumar Bhayal, SSSIST Sehore

Keywords:

Cloud security, cryptography, Cloud computing.

Abstract

Cloud security means providing security to users data. There are so many methods for doing this task. They all have their merits and demerits. To ensure the security of users' data in the cloud, we propose an effective, scalable and flexible cryptography based scheme. Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against malicious data modification attack, The proposed scheme not only achieves scalability due to its hierarchical structure, but also inherits flexibility. We implement our scheme and show that it is both efficient and flexible in dealing with access control for outsourced data in cloud computing with comprehensive experiments.

Other Details

Paper ID: IJSRDV1I5008
Published in: Volume : 1, Issue : 5
Publication Date: 01/08/2013
Page(s): 1071-1072

Article Preview

Download Article