Improving Trust Worthiness of Data Integrity Verification in C-MAC Algorithm |
Author(s): |
C. Lochan Yadav , KMM Institute of PG Studies; Mr. J. S. Ananda Kumar, KMM Institute of PG Studies |
Keywords: |
Data Integrity, C MAC Algorithm, Trust Worthiness, Sensor Trustworthiness |
Abstract |
Many users store their data in the cloud storage and benefit from high quality applications and services from a common group of composition computing resources like networks, servers, storage, applications, and services, by these users can bypass the load of local data storage and protection. However, the fact that users no longer have physical control of the large size of data makes data trustworthiness protection in Cloud computing a challenging task, especially for users with constrained computing resources. Cloud computing is used by many software industries nowadays, since security is not provided in cloud, many organizations adopt their unique security structure. To improve the performance by making use of CMAC algorithm. The cloud must not command on user the responsibility to verify his/ her stored data. Taking this into consideration and relieve client form the overhead of data trustworthiness verification, we introduce an entity called the Third Party Auditor (TPA), which acts on behalf of client for data trustworthiness checking and send an alert to notify the status of the stored data. We further become the TPA to finish various assessing errands all the while and competently. In this paper, we are tying down the customer data and giving security by using CMAC Algorithm. We further become the TPA to finish various assessing errands all the while and competently. Wide-extent of security and execution examination exhibits the proposed plans is provably secure and significantly profitable. |
Other Details |
Paper ID: IJSRDV7I10384 Published in: Volume : 7, Issue : 1 Publication Date: 01/04/2019 Page(s): 428-432 |
Article Preview |
|
|