IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Dynamic Evaluation Service for Safe Cloud Retention With Protection of Privacy and Reduction of Cyber Security Attacks

Dynamic Evaluation Service for Safe Cloud Retention With Protection of Privacy and Reduction of Cyber Security Attacks
View Sample PDF
Author(s): M. Mageshwari (SRM Institute of Science and Technology, India), D. Prabakar (SRM Institute of Science and Technology, India), S. Anitha (St. Joseph's College of Engineering, India)and M. Vasim Babu (Madras Institute of Technology, Anna University, India)
Copyright: 2024
Pages: 14
Source title: Enhancing Security in Public Spaces Through Generative Adversarial Networks (GANs)
Source Author(s)/Editor(s): Sivaram Ponnusamy (Sandip University, Nashik, India), Jilali Antari (Ibn Zohr Agadir University, Morocco), Pawan R. Bhaladhare (Sandip University, Nashik, India), Amol D. Potgantwar (Sandip University, Nashik, India)and Swaminathan Kalyanaraman (Anna University, Trichy, India)
DOI: 10.4018/979-8-3693-3597-0.ch010

Purchase


Abstract

The cutting-edge technology that is growing in popularity worldwide is cloud computing. Keeping the data in the cloud via cloud storage because it can be accessed from anywhere at any time. There exist many different privacy-preserving data auditing methods, each of which has benefits and drawbacks of its own. As a result it's essential to create an auditing approach that does away with all of the drawbacks of existing strategies. The cloud, the TPA, and the data owner server comprise its three key components. The owner of the data performs static data operations like introducing, altering, and deleting data as well as dynamic data operations like dividing a file, encoding it in chunks, establishing a each block's hash value, combining them, and signing it. Data validation can either be carried out automatically or at the user's request. The setting up of an audit service with elements like privacy protection, open auditing, data integrity, and privacy is the main objective.

Related Content

Rais Abdul Hamid Khan, Yogesh Kantilal Sharma, Mandar S Karyakarte, Bipin Sule, Aarti Amod Agarkar. © 2024. 11 pages.
Dwijendra Nath Dwivedi, Ghanashyama Mahanty, Shafik Khashouf. © 2024. 14 pages.
Patel Janit Umeshbhai, Panchal Yash Kanubhai, Shaikh Mohammed Bilal, Shanti Verma. © 2024. 13 pages.
Swaminathan Kalyanaraman, Sivaram Ponnusamy, S. Saju, S. Sangeetha, R. Karthikeyan. © 2024. 14 pages.
Delshi Howsalya Devi, P. Santhosh Kumar, M. Aruna, S. Sharmila. © 2024. 23 pages.
Mamta P. Khanchandani, Sanjay H. Buch, Shanti Verma, K. Baskar. © 2024. 13 pages.
Harshita Chourasia, Neha Tiwari, Shraddha Raut, Anansingh Thinakaran, Anirudh A. Bhagwat. © 2024. 13 pages.
Body Bottom