(Publisher of Peer Reviewed Open Access Journals)
ICETTR-2013
Full-Text PDF
Paper Title : A3 (Authenticate Auditor & Avail) for Preserving Integrity of Data in Cloud Computing
Author Name : Sagar Shivaji Sawant, Suhit Sukhadeo Kalubarme
Abstract : Cloud computing is a technology that allows anyone connected to the internet to use hardware & software on-demand. Cloud computing provides services in three different models: Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS) and Deployment Models (Public Cloud, Private Cloud, Community Cloud, and Hybrid Cloud). In Cloud Computing, users can remotely store their data into the cloud & access the data on-demand. Data is stored & maintained remotely by Cloud Service Provider (CSP). Cloud user has no control over the data. Data integrity is one of the most critical issue in the cloud computing. This paper proposes two fundamentals requirements to protect the data from unauthorized access: 1) Third Party Auditor (TPA) scheme to monitor the data available on the cloud server and to protect cloud user from accessing invalid data (Modified data by the Cloud Service Provider for their sake, without concerning Cloud User). We consider TPA to work on behalf of the Cloud User, to verify the integrity of the data store in the cloud. A TPA who has more knowledge, experienced and resources to audit the integrity of data placed onto the cloud. 2) Unauthorized users or hackers should not pretend as TPA, because TPA is trusted party for the Cloud Users, however problem may arise when attacker impersonates as a TPA. We rectify this problem by using the RSA implementation.
Keywords : Cloud, Encryption, Hashing, Integrity, Impersonation, TPA.
Cite this article : Sagar Shivaji Sawant, Suhit Sukhadeo Kalubarme " A3 (Authenticate Auditor & Avail) for Preserving Integrity of Data in Cloud Computing " ,ICETTR-2013 ,Page No : 390-395.