Secure cloud data computing with third party auditor control

3Citations
Citations of this article
15Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Cloud computing has been targeted as the future on demand architecture of IT enterprise. Cloud Computing can be used with trustworthy mechanism to provide greater data resources in comparison to the traditional limited resource computing. But the security challenges can stop the feasibility in the use of IT enterprises. In this paper, our aim is to provide a trustworthy solution for the cloud computing. Our proposed methodology provides secure centralized control and alert system. We are applying the same token with distributed verification with the centralized data scheme. Our approach achieves the integration of storage correctness insurance and data error localization, i.e., the identification of misbehaving clients and it can be control by the servers. It can support data updating, deletion and visualization on demand with the restrictive tokenization. Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even colluding attacks.

Cite

CITATION STYLE

APA

Rathi, A., & Parmar, N. (2015). Secure cloud data computing with third party auditor control. In Advances in Intelligent Systems and Computing (Vol. 328, pp. 145–152). Springer Verlag. https://doi.org/10.1007/978-3-319-12012-6_17

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free