Implementation of Cloud Storage Security Mechanism with Authentication
Pages : 2213-2217
Download PDF
Abstract
Facts and computation integrity as well as security are major considerations for end users of Cloud computing facilities. Today’s clouds typically place centralized, universal trust in all the cloud’s nodes. This simplistic, full -trust model has the negative consequence of amplifying potential damage from node compromises, leaving such clouds vulnerable to myriad attacks. Unfortunately, adopting cloud computing has required users to cede control of their data to cloud providers, and a malicious provider could compromise with data’s confidentiality and integrity. This
paper presents implementation of the cloud storage security mechanism that helps to secure data and provide better security from unwanted attack.
Keywords: Chunks, TPA, MD5, Cloud Storage, Security
Article published in International Journal of Current Engineering and Technology, Vol.5, No.3 (June-2015)