Abstract: – Data security has constantly been a major difficultyin information technology. In the cloud computing environment, it becomes mainlyserious because the data is located in different places even in the entireglobe. Data security and privacy protection are the two main factors of user’sconcerns about the cloud technology.
Though many techniques on the topics incloud computing have been investigated in both academics and industries, datasecurity and privacy protection are becoming more important for the futuredevelopment of cloud computing technology in government, industry, andbusiness. Data security and privacy protection issues are relevant to bothhardware and software in the cloud architecture. This study is to reviewdifferent security techniques and challenges from both software and hardwareaspects for protecting data in the cloud and aims at enhancing the datasecurity and privacy protection for the trustworthy cloud environment. In thispaper, we make a comparative research analysis of the existing research workregarding the data security and privacy protection techniques used in the cloudcomputing.
The Cloud is a platform where all users not only store their databut also used the software and services provided by Cloud Service Provider(CSP). The service provided by the cloud is very economical. This is a policywhere data holder remotely stores their data in the cloud to adore the highquality applications and services. The user can access the data, use the dataand store the data. In a Corporate world there are large number of client whoaccessing their data and modifying a data. In Cloud, application software andservices are move to the centralized large data center and management of thisdata and services may not be trustworthy. To maintain this data we use thirdparty auditor (TPA).It will check the consistency of data but it increases thedata integrity risk of data holder.
Since TPA not only read the data but alsohe can modify the data, therefore a mechanism should be provided who solvedthis problem. We first examine the problem and new potential security schemeused to solve this problem. Our algorithm encrypt the content of file at userlevel which ensure the data owner and client that there data are intact.
Sideby side it also preserves the data dynamics and consistency of n number ofclient and server.