Abstract

The growth of cloud computing has led to privacy concerns abundantly. Any organisation/user sends all the information to the cloud service provider and so the organisation's/user's data security is a concern. Data privacy and security issues can be solved by establishing clear policies that enable authorised data access and security. User authentication is the primary basis for access control and so using cryptographic encryption mechanism like key policy attribute-based encryption we can provide strong authentication to ensure that data can be viewed by only who have to access it. Followed by which a never compromised integrity mechanism like SHA-256 hash mechanism is used to ensure that data is not modified in transit. These hashes are concatenated in a way to form top hash by structuring in a Merkle hash tree. They are used by the erasure code to find lost data during any of the crashes. To make it efficient and to find the data loss, third party auditors are installed to check and report any changes in any of the cloud storage. Data recovery is by means of retrieving the data from another cloud that has the replica of these data.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call