International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 113 | Views: 179

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015 | Rating: 7 / 10


Security to Outsource Data in Community Cloud with the Trusted Tenant System

Kundan Kunal | Dr. Latesh Malik


Abstract: Cloud Computing is the dreamed vision of next-generation IT infrastructure. In cloud architecture community cloud shared among several user or organization for the common purpose. In cloud environment application and data placed to centralized data centres through which user can enjoy service like on demand, location independent and relieve from burden of storage and maintenance of data and reduced hardware soft ware cost. Placing the critical data in the hands of a cloud provider that fact that users no longer have possession to outsource data so cloud environment should guarantee of security of data to the user and fully trustworthy to use. Security of outsource data is very challenging task in cloud environment. We propose tenant system that provides the security to community cloud that guarantee security of data stored in server or motion in channel. In this paper two different encryption methods RC6 and SHA1 is used to provide the security to cloud data and the database. This architecture used OAuth technique for the user authentication to access the system and for the secure sharing of data to different user with in the cloud TTLS (Tunnel transport layer security) technique is used for secured sharing. The results of this system provide highly secured environment for data to place in cloud server and result ensure about the security of outsource data with different techniques at different level.


Keywords: Cloud computing, Security, RC6, OAuth SHA1, TTLS


Edition: Volume 4 Issue 4, April 2015,


Pages: 2703 - 2708


How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link


Verification Code will appear in 2 Seconds ... Wait

Top