Abstract
In the present paper a review related to Achieving Cloud Security using Third Party Auditor and Preserving Privacy for Shared Data over Public Cloudwas done. Cloud computing is a new technology that will attract greater attention from industry and academics in the future. When compared to the expense of creating infrastructure, this technology is more appealing. However, like with any maturing technology, there will be several security vulnerabilities with this system. This research study achieves substantial breakthroughs in data security, data integrity, and access control in the public cloud. Third Party Auditor (TPA) and user separation are successfully employed in this procedure. The TPA uses a hybrid signature generating technique called MD5withRSA. The access control is used to segregate users from data owners, and only those users who have been allowed access by the data owners can access the owner's data.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Advanced Research in Science, Communication and Technology
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.