User Level Runtime Security Auditing for the Cloud Using Aes
Main Article Content
Abstract
With the demand of human increases and evolving of technology increasing rapidly, there is lot of data which is there to store on internet and with the help of Cloud Computing which delivers processing power and application to storage. No need to own large infrastructure or large data centers which limits the cost and complexity of owning and maintenance the large infrastructure. It is like pay for what they use. Through Natural language processing, Artificial Intelligence and standard office application cloud computing covers range of options like processing power, networking and storage.We suggested a framework which is privacy-preserving framework that allows for public reviews of cloud-based shared data.From the studies found, cloud computing evolved towards upper curve of graph. An effective public auditing protocol need to be developed which overcomes the auditing schemes. It is created to ensure that cloud data was accurate using Third Party Administrator. During review process, it ensures that no data material is leaked to third parties. The user or owner is in control for dividing files into blocks and generating MD-5 botch value using various algorithm. The encrypted files or blocks are stored in cloud server. Hash values are then concatenated and AES signature is generated for the file.
Downloads
Metrics
Article Details
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.