Open Access Open Access  Restricted Access Subscription Access

Secure Hashing Algorithm for Third Party Auditing in Cloud Environment

K. Raju, M. Chinnadurai

Abstract


Cloud computing is the platform of next generation can efficiently provide services to service providers and provide massive storage capabilities. Virtual machine also play a vital role by providing environment to application developers security is one of the constraints for companies to use cloud computing fully. TPA (Third Party Auditing) become very important in cloud .Auditor work with the issues such that trust and processing overhead a) Archive good auditing without requiring the data storage area b) Avoid injecting new malicious code during the auditing work. In this paper we provide a security algorithm to protect the data so introduce the new scheme which involves cloud server. TPA and Owner integrity of data verify by TPA. Auditing scheme involves cryptographic algorithm is SHA. Sensitive data may get exposed to unauthorized parties. If security isn’t robust and consistent, benefits that cloud computing have to provide will have little believeability.SHA algorithm for the security purpose on the cloud environment.

 


Full Text:

PDF

Refbacks

  • There are currently no refbacks.