International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 107 | Views: 242

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 7, July 2014 | Popularity: 6.9 / 10


     

A New Security Business Frame work for Resource Attestation in cloud Environment

Vallabhaneni. Hema Latha, Kolluru. Suresh Babu


Abstract: In Data Storage as a Service (STaaS) cloud computing environment, the equipment used for business operations can be leased from a single service provider along with the application, and the related business data can be stored on equipment provided by the same service provider. This type of arrangement can help a company save on hardware and software infrastructure costs, but storing the companys data on the service providers equipment raises the possibility that important business information may be improperly disclosed to others [1]. Some researchers have suggested that user data stored on a service-providers equipment must be encrypted [2]. Encrypting data prior to storage is a common method of data protection, and service providers may be able to build firewalls to ensure that the decryption keys associated with encrypted user data are not disclosed to outsiders. However, if the decryption key and the encrypted data are held by the same service provider, it raises the possibility that high-level administrators within the service provider would have access to both the decryption key and the encrypted data, thus presenting a risk for the unauthorized disclosure of the user data. we in this paper provides an unique business model of cryptography where crypto keys are distributed across the user and the trusted third party (TTP) with adoption of such a model mainly the CSP insider attack an form of misuse of valuable user data can be treated secured.


Keywords: cloud computing, service level agreements, encryption and decryption cloud service, data privacy protection


Edition: Volume 3 Issue 7, July 2014


Pages: 1948 - 1954



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Vallabhaneni. Hema Latha, Kolluru. Suresh Babu, "A New Security Business Frame work for Resource Attestation in cloud Environment", International Journal of Science and Research (IJSR), Volume 3 Issue 7, July 2014, pp. 1948-1954, https://www.ijsr.net/getabstract.php?paperid=22071407, DOI: https://www.doi.org/10.21275/22071407



Similar Articles

Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024

Pages: 516 - 519

I-Vote Android Application for Internet-Voting

Rahul Kumar, Hima Saxena, Dr. Suman Sharma

Share this Article

Downloads: 190 | Weekly Hits: ⮙6 | Monthly Hits: ⮙6

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 11 Issue 5, May 2022

Pages: 1007 - 1011

Cloud Computing in Science and Technology: A Review

Rupinder Kaur

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Proposals or Synopsis, Computer Science & Engineering, India, Volume 11 Issue 9, September 2022

Pages: 837 - 842

An Optimized IoT-Enabled Big Data Analytics Architecture for Edge-Cloud Computing Using Deep Learning

Bharathi K.

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 12 Issue 5, May 2023

Pages: 273 - 278

Genetic based Task Scheduling Algorithms in Cloud Computing Environment

Dr. R. Kavitha, Kale Jyoti S.

Share this Article



Top