Research Paper | Computer Science & Engineering | India | Volume 3 Issue 7, July 2014
A New Security Business Frame work for Resource Attestation in cloud Environment
Vallabhaneni. Hema Latha, Kolluru. Suresh Babu
In Data Storage as a Service (STaaS) cloud computing environment, the equipment used for business operations can be leased from a single service provider along with the application, and the related business data can be stored on equipment provided by the same service provider. This type of arrangement can help a company save on hardware and software infrastructure costs, but storing the companys data on the service providers equipment raises the possibility that important business information may be improperly disclosed to others [1]. Some researchers have suggested that user data stored on a service-providers equipment must be encrypted [2]. Encrypting data prior to storage is a common method of data protection, and service providers may be able to build firewalls to ensure that the decryption keys associated with encrypted user data are not disclosed to outsiders. However, if the decryption key and the encrypted data are held by the same service provider, it raises the possibility that high-level administrators within the service provider would have access to both the decryption key and the encrypted data, thus presenting a risk for the unauthorized disclosure of the user data. we in this paper provides an unique business model of cryptography where crypto keys are distributed across the user and the trusted third party (TTP) with adoption of such a model mainly the CSP insider attack an form of misuse of valuable user data can be treated secured.
Keywords: cloud computing, service level agreements, encryption and decryption cloud service, data privacy protection
Edition: Volume 3 Issue 7, July 2014
Pages: 1948 - 1954
How to Cite this Article?
Vallabhaneni. Hema Latha, Kolluru. Suresh Babu, "A New Security Business Frame work for Resource Attestation in cloud Environment", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=22071407, Volume 3 Issue 7, July 2014, 1948 - 1954
118 PDF Views | 93 PDF Downloads
Similar Articles with Keyword 'cloud computing'
Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018
Pages: 81 - 84Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey
Priyanka H, Dr. Mary Cherian
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013
Pages: 71 - 73Cloud Computing and Its Types in Mobile Network
Palak Jain
Review Papers, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021
Pages: 594 - 596A Review of Replication Strategies to Increase Data Availability for Data Intensive Applications in Cloud
K. Sreelatha
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020
Pages: 1028 - 1031Secure and Efficient Item Information Retrieval in Cloud Computing
Dr. Shameem Akther, Tahseen Begum
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013
Pages: 315 - 318Cloud Computing - A Birds Eye View
S.Kalaiselvi, S.V.Revathi
Similar Articles with Keyword 'service level agreements'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2025 - 2029Investigation of Security in Cloud Computing
Annu Devi
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1948 - 1954A New Security Business Frame work for Resource Attestation in cloud Environment
Vallabhaneni. Hema Latha, Kolluru. Suresh Babu
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1082 - 1086A Comprehensive Analysis of Existing Load Balancing Algorithms in Cloud Network
Pinki, Nida
Review Paper, Computer Science & Engineering, India, Volume 2 Issue 11, November 2013
Pages: 337 - 341Review on: Resource Provisioning in Cloud Computing Environment
Sagar Girase, Rahul Samant, Mayank Sohani, Suraj Patil
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 917 - 923Trusted Third Party Framework for Data Security in Cloud Computing Environment
Ravuri. Venkata Bhargavi, K. Narayana Rao
Similar Articles with Keyword 'data privacy protection'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1948 - 1954A New Security Business Frame work for Resource Attestation in cloud Environment
Vallabhaneni. Hema Latha, Kolluru. Suresh Babu
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 1771 - 1776A Secure Information Hiding Approach in Cloud Using LSB
Mudasir Ahmed Muttoo, Pooja Ahlawat
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 626 - 629A Robust and Flexible Authentication Model with Data Security ? A Review
Nandini Aggarwal, Abhinav Bhandari
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 917 - 923Trusted Third Party Framework for Data Security in Cloud Computing Environment
Ravuri. Venkata Bhargavi, K. Narayana Rao