Abstract

In the present paper a review related to Achieving Cloud Security using Third Party Auditor and Preserving Privacy for Shared Data over Public Cloudwas done. Cloud computing is a new technology that will attract greater attention from industry and academics in the future. When compared to the expense of creating infrastructure, this technology is more appealing. However, like with any maturing technology, there will be several security vulnerabilities with this system. This research study achieves substantial breakthroughs in data security, data integrity, and access control in the public cloud. Third Party Auditor (TPA) and user separation are successfully employed in this procedure. The TPA uses a hybrid signature generating technique called MD5withRSA. The access control is used to segregate users from data owners, and only those users who have been allowed access by the data owners can access the owner's data.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.