A Proficient Model for High End Security in Cloud Computing
Abstract
vioft2nntf2t|tblJournal|Abstract_paper|0xf4ff3e9214000000d497020001000400
Cloud computing is an inspiring technology due to its abilities like ensuring scalable services, reducing the anxiety of local hardware and software management associated with computing while increasing flexibility and scalability. A key trait of the cloud services is remotely processing of data. Even though this technology had offered a lot of services, there are a few concerns such as misbehavior of server side stored data , out of control of data owner's data and cloud computing does not control the access of outsourced data desired by the data owner. To handle these issues, we propose a new model to ensure the data correctness for assurance of stored data, distributed accountability for authentication and efficient access control of outsourced data for authorization. This model strengthens the correctness of data and helps to achieve the cloud data integrity, supports data owner to have control on their own data through tracking and improves the access control of outsourced data.

Authors
R. Bala Chandar1, M. S. Kavitha2, K. Seenivasan3
Sri Shakthi Institute of Engineering and Technology, India1, Sri Eshwar College of Engineering and Technology, India2, Renganayagi Varatharaj College of Engineering, India3

Keywords
Data Security, Data Correctness, Data Control, Access Control, Data Integrity
Yearly Full Views
JanuaryFebruaryMarchAprilMayJuneJulyAugustSeptemberOctoberNovemberDecember
000200000000
Published By :
ICTACT
Published In :
ICTACT Journal on Soft Computing
( Volume: 4 , Issue: 2 , Pages: 697-702 )
Date of Publication :
January 2014
Page Views :
111
Full Text Views :
2

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.