Site Loader

LOCATION

510 5th Ave, New York, NY 10036, USA

CONCLUSION

In this paper, we examined the problem for security associated issues while storing the information on cloud. To prevent and implement illegal access to a user’s data on cloud we devised an efficient system architecture which supports efficient operations on data like modification of data, deleting or appending the data. We implemented ip triggering which triggers a mail to the user’s registered email address on unauthorized access of data. On the second level, we have used a password login system with a key to prevent access of files other than the sole owner. Even if the key is compromised the system detects unauthorized access by comparing the ip against its database and if they don’t match successfully redirecting it to the dummy file thus preventing the users’ data from being corrupted or modified.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

The area of cloud computing is still in bloom so still many vulnerabilities are not discovered and has decent amount of challenges. The most hopeful development which we can expect from cloud computing is to provide the user with decent amount of control of their own data. Automating the system to check for any modifications in data by using hashing algorithms and calculating checksum for checking with any modifications attack like SHA-checksum.

Post Author: admin

x

Hi!
I'm Chloe

Would you like to get a custom essay? How about receiving a customized one?

Check it out