Cloud computing has been targeted as the future on demand architecture of IT enterprise. Cloud Computing can be used with trustworthy mechanism to provide greater data resources in comparison to the traditional limited resource computing. But the security challenges can stop the feasibility in the use of IT enterprises. In this paper, our aim is to provide a trustworthy solution for the cloud computing. Our proposed methodology provides secure centralized control and alert system. We are applying the same token with distributed verification with the centralized data scheme. Our approach achieves the integration of storage correctness insurance and data error localization, i.e., the identification of misbehaving clients and it can be control by the servers. It can support data updating, deletion and visualization on demand with the restrictive tokenization. Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even colluding attacks.
CITATION STYLE
Rathi, A., & Parmar, N. (2015). Secure cloud data computing with third party auditor control. In Advances in Intelligent Systems and Computing (Vol. 328, pp. 145–152). Springer Verlag. https://doi.org/10.1007/978-3-319-12012-6_17
Mendeley helps you to discover research relevant for your work.