Level-Based Data Security Model in Cloud Computing
Kanupriya1, Meenakshi Sharma2
1Kanupriya, Kanupriya, Pursuing M.Tech, Department of Computer Science & Engineering, SSCET, Badhani (Punjab), India.
2Meenakshi Sharma, Associate Professor, Department of Computer Science & Engineering, SSCET, Badhani (Punjab), India.
Manuscript received on 10 July 2014 | Revised Manuscript received on 20 July 2014 | Manuscript Published on 30 July 2014 | PP: 68-71 | Volume-4 Issue-2, July 2014 | Retrieval Number: B1740074214/14©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Cloud Computing has brought remarkable advancement in era of computing but still adoption of cloud now days become issue due to security. Security is big concern in cloud computing. Data owner feels that data is insecure hands and vulnerable to many threats. To tackle this problem model has been proposed which check data security at different levels i.e. at cloud service provider level, user level, third party level and network intruder level. Various cryptography techniques used for data encryption, message authentication code is generated for data integrity and role-based dual verification is performed for user authenticity. The proposed model is highly efficient and secure for keeping data at cloud with minimum overhead over data owner. This model also provides data confidentiality, availability, data integrity and cost effective for storing data at cloud without risk.
Keywords: Cloud Computing, MAC, Security, Encryption.
Scope of the Article: Cloud Computing