11Security Protocol for Cloud-Based Communication

R. Suganya1* and S. Sujatha2

1 Department of Information Technology, Thiagarajar College of Engineering, Madurai India

2 Department of Computer Applications, Anna University, Trichy, India


Cloud technology and its services lessens the requirement to spend more in modern technology infrastructure, by providing access to infrastructure and services on a “pay per use” model, which severely diminishes the cost and make things easier to accept the current technology. But security concern has become the biggest hindrance to adoption of cloud because all information and data are completely under the control of cloud service providers. Security problems have pierced into the most layers of cloud computing, from system to framework administration. It is classified as two broad categories: security issues faced by cloud providers and security issues faced by their clients. Lot of security issues in system and information supply are additionally relevant to cloud computing because of the interconnections between the specialized applications like virtual machine. Hence flexible distributed storage integrity auditing mechanism has provided a secure and dependable services in cloud computing. Newly designed framework is called as privacy and integrity preserving dynamic auditing protocol for data storage security in cloud computing. This framework has been utilized the homomorphic authenticator and random masking which guaranteed ...

Get Design and Analysis of Security Protocol for Communication now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.