Abstract
Cloud computing is a general term that includes everything which is delivered as a service. Cloud computing can be identified as a technology which leverages economic growth and improvisation of usage of resources on demand. In the dream of computing world, service providers turn their infrastructure world into an environment where organizations can do their business by running their applications over the internet. Apart from that the cloud storage services enables the end users to enjoy their facility by moving their entire data onto the cloud. This facilitates the technology to focus on various security issues and challenges that has to be resolved. This paper discusses in detail about deploying a protocol by using Elliptical Curve digital signature algorithm. This proposed protocol is established to enforce a security proof by checking for the data integrity. The protocol ensures the security against third party auditor and security against the untrusted server. This paper proves its integrity of the data through a formal analysis.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Review on Computers and Software (IRECOS)
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.