LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Nimat, Prabodh S; Itkikar, A R (2013)
Publisher: Journal of Engineering Computers & Applied Sciences
Journal: Journal of Engineering Computers & Applied Sciences
Languages: English
Types: Article
Subjects: Third party auditor, Cloud Computing, Cloud Security, Cloud service provider., Computer Sciences

Classified by OpenAIRE into

ACM Ref: Data_MISCELLANEOUS
In this paper we discuss the evolvement of cloud computing paradigm and present a framework for secure cloud computing through third party auditing. The contribution of the paper is to understand the implication of cloud computing and what is meant secure cloud computing via third party auditing rather than propose a new methodology and new technology to secure cloud computing. Our holistic approach has strategic value to those who are using or consider using cloud computing because it addresses concerns such as security, privacy and regulations and compliance. In this article, we focus on cloud data storage security, which has always been an important aspect of quality of service. Including: data update, delete and append. Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks.
  • No references.
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article