Abstract: – Information security has always been a main difficultyin information technology. In cloud computing environment, it becomes mainlyserious because the files are located in different places even in the entire world.
Data safety and confidentiality protection are the two key factors of user’sconcerns around the cloud technology. Although various techniques on the topicsin cloud computing have been considered in both academics and businesses, datasecurity and secrecy are becoming more important for the future development ofcloud computing technology in government, industry, and business. Data securityand privacy protection issues are appropriate to both hardware and software inthe cloud architecture.
This study is to review different security techniques andchallenges from both software and hardware aspects for protecting data in thecloud and aims at enhancing the data security and privacy protection for thetrustworthy cloud environment. In this paper, we make a relative research studyof the existing research effort as regards the data security and privacyprotection methods used in the cloud computing. The Cloud is a platform where usersnot only store their data but also used the software and services provided byCloud Service Provider (CSP). The service delivered by the cloud is veryeconomical. This is a policy where data holder remotely stores their data inthe cloud to adore the high quality applications and services. The user canaccess the data, use the data and store the data.
In a Corporate world thereare large number of client who accessing their data and modifying a data. InCloud, application software and services are move to the centralized large datacenter and management of this data and services may not be trustworthy. To maintainthis data we use third party auditor (TPA).It will check the consistency ofdata but it increases the data integrity risk of data holder. Since TPA notonly read the data but also he can modify the data, therefore a mechanismshould be provided who solved this problem. We first examine the problem andnew potential security scheme used to solve this problem.
Our algorithm encryptthe content of file at user level which ensure the data owner and client thatthere data are intact. Side by side it also preserves the data dynamics andconsistency of n number of client and server.