A New Approach to Data Authentication in Cloud Storage
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 118 , Downloads: 104 | CTR: 88 % | Weekly Popularity: ⮙4

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 12, December 2015

A New Approach to Data Authentication in Cloud Storage

V. Abhiram, Srikakolapu NVSSST Murty

Cloud computing is getting more attention from last decades from the various organization because of its outsourcing facility of data storage using Internet. Therefore Security and privacy became more challenging to secure all these data. It definitely assured so that affective cloud doesnt diversify by affective information which is utilized. The innovative DAC method was expected in the clouds for extra verifications to protect information repository. In this method, cloud checks the attestation about effective sequence rather than to know the clients identification before to place the information in the repository. It was also introduced a scheme by which a valid user can have access to decipher the stored data. It also observed that this scheme is better than the existing centralized method.

Keywords: Cloud computing, DAC, Security, Privacy and Decipher

Edition: Volume 4 Issue 12, December 2015

Pages: 750 - 754

Share this Article

How to Cite this Article?

V. Abhiram, Srikakolapu NVSSST Murty, "A New Approach to Data Authentication in Cloud Storage", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV152039, Volume 4 Issue 12, December 2015, 750 - 754

118 PDF Views | 104 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cloud computing'

Views: 201 , Downloads: 173 | CTR: 86 %

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Views: 129 , Downloads: 95 | CTR: 74 % | Weekly Popularity: ⮙4

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021

Pages: 594 - 596

A Review of Replication Strategies to Increase Data Availability for Data Intensive Applications in Cloud

K. Sreelatha

Share this Article

Views: 122 , Downloads: 96 | CTR: 79 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

Views: 402 , Downloads: 97 | CTR: 24 % | Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 315 - 318

Cloud Computing - A Birds Eye View

S.Kalaiselvi, S.V.Revathi

Share this Article

Views: 151 , Downloads: 97 | CTR: 64 % | Weekly Popularity: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2483 - 2487

Accountability of Data usage in Cloud Computing

Nitin P. Doiphode, Hemlata Channe

Share this Article

Similar Articles with Keyword 'DAC'

Views: 125 , Downloads: 99 | CTR: 79 % | Weekly Popularity: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1752 - 1755

SNPDAC: Secure Network Protocol with Data Access Controlling in WSN

Uttarkar Amit Ratikant, Hingoliwala H. A.

Share this Article

Views: 118 , Downloads: 104 | CTR: 88 % | Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 750 - 754

A New Approach to Data Authentication in Cloud Storage

V. Abhiram, Srikakolapu NVSSST Murty

Share this Article

Views: 153 , Downloads: 105 | CTR: 69 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2712 - 2714

Privacy Preserving DAC for Data in Cloud

Pankaj R. Chandre, Swati S. Gore

Share this Article

Views: 132 , Downloads: 106 | CTR: 80 % | Weekly Popularity: ⮙3

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1510 - 1513

A Survey on Optimal Data Storage of Cache Manager for Big Data Using Map Reduce Framework

Rupali Pashte, Ritesh Thakur

Share this Article

Views: 124 , Downloads: 107 | CTR: 86 % | Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 1940 - 1943

Analysis of Common Access Control Models and Their Limitations in Cloud Computing Environment

Mojtaba Mohamamdi, Keshav Kishore

Share this Article

Similar Articles with Keyword 'Security'

Views: 30 , Downloads: 25 | CTR: 83 % | Weekly Popularity: ⮙18

Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021

Pages: 139 - 144

Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic

Senthuran Nallainathan

Share this Article

Views: 47 , Downloads: 40 | CTR: 85 %

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Views: 49 , Downloads: 40 | CTR: 82 % | Weekly Popularity: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Views: 163 , Downloads: 40 | CTR: 25 %

Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020

Pages: 1544 - 1554

Recent Developments on Probabilistic Graphical Model Applied in Data Analysis

Kan'Sam Nadjak, Guisheng Yin

Share this Article

Views: 63 , Downloads: 45 | CTR: 71 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021

Pages: 700 - 705

Virtual Augmented Reality Application and Research in Police Station Management System with Security Aspects

Kale Jyoti S

Share this Article
Top