International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 138 - Number 8 |
Year of Publication: 2016 |
Authors: Reshu Tomar, Rajkumar Singh Rathore |
10.5120/ijca2016909011 |
Reshu Tomar, Rajkumar Singh Rathore . Privacy Preserving in TPA using Secured Encryption Technique for Secure Cloud. International Journal of Computer Applications. 138, 8 ( March 2016), 33-36. DOI=10.5120/ijca2016909011
Cloud computing is a model for enabling everywhere, well-located, on-demand network access to a shared pool of compo sable computing resources (e.g., servers, networks, applications, and services). Mainly users can digress the support and maintenance of IT services to cloud service providers which is expert in providing knowledge and also maintains the vast amount of IT resources. Just like a double-bladed sword, cloud computing also brings in many new security challenges to ensure the protection of confidentiality and to preserve the integrity of users data in the cloud. To resolve these problems, this work uses the technique of secret key based symmetric key cryptography which enables TPA to perform the auditing task without demanding the local copy of user’s stored data and thus severely reduces the computation and transmission overhead as compare to simple, straightforward data auditing approaches. Thereby integrating the encryption with hashing, this work guarantees that the TPA could not learn any knowledge about the data content that is store in the cloud server during the auditing process.