Privacy-Preserving Public Auditing In Cloud Using HMAC Algorithm
S.Ezhil Arasu1, B.Gowri2, S.Ananthi3
1S.Ezhil Arasu, Department of Computer Science and Engineering, Anna University, SNS College Of Technology, Coimbatore (Tamil Nadu), India.
2B.Gowri, Department of Computter Science and Engineering, Anna University, SNS College Of Technology, Coimbatore (Tamil Nadu), India.
3S.Ananthi, Department of Computer Science and Engineering, Anna University, SNS College of Technology, Coimbatore (Tamil Nadu), India.
Manuscript received on 21 March 2013 | Revised Manuscript received on 28 March 2013 | Manuscript published on 30 March 2013 | PP: 149-151 | Volume-2 Issue-1, March 2013 | Retrieval Number: A0540032113/2013©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Cloud computing is the arising technology to minimize the user burden in the updation of data in business using internet. Instead of local data storage and maintenance, the user is assisted with the cloud storage so that the user can remotely store their data and enjoy the on-demand high quality application from a shared pool of resources. The data stored must be protected in the cloud storage. To enhance the correctness of data, auditing process is done which is carried out by TPA(Third Party Auditor). The TPA must be efficient to audit without demanding the local copy of data. In this paper we have proposed a method that uses the keyed Hash Message Authentication Code (HMAC) with the Homomorphic tokens to enhance the security of TPA.
Keywords: Cloud Storage, Integrity, Third Party Auditor.
Scope of the Article: Cloud computing