User Level Runtime Security Auditing for the Cloud Using Aes
Main Article Content
Abstract
With the demand of human increases and evolving of technology increasing rapidly, there is lot of data which is there to store on internet and with the help of Cloud Computing which delivers processing power and application to storage. No need to own large infrastructure or large data centers which limits the cost and complexity of owning and maintenance the large infrastructure. It is like pay for what they use. Through Natural language processing, Artificial Intelligence and standard office application cloud computing covers range of options like processing power, networking and storage.We suggested a framework which is privacy-preserving framework that allows for public reviews of cloud-based shared data.From the studies found, cloud computing evolved towards upper curve of graph. An effective public auditing protocol need to be developed which overcomes the auditing schemes. It is created to ensure that cloud data was accurate using Third Party Administrator. During review process, it ensures that no data material is leaked to third parties. The user or owner is in control for dividing files into blocks and generating MD-5 botch value using various algorithm. The encrypted files or blocks are stored in cloud server. Hash values are then concatenated and AES signature is generated for the file.
Downloads
Metrics
Article Details
Licensing
TURCOMAT publishes articles under the Creative Commons Attribution 4.0 International License (CC BY 4.0). This licensing allows for any use of the work, provided the original author(s) and source are credited, thereby facilitating the free exchange and use of research for the advancement of knowledge.
Detailed Licensing Terms
Attribution (BY): Users must give appropriate credit, provide a link to the license, and indicate if changes were made. Users may do so in any reasonable manner, but not in any way that suggests the licensor endorses them or their use.
No Additional Restrictions: Users may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.