Security in Cloud Computing Based on Third Party Auditor: A Survey

Loading...
Thumbnail Image

Authors

Ben Haj Frej, Mohamed
Dichter, Julius
Gupta, Navarun

Issue Date

2016-10-14

Type

Presentation

Language

en_US

Keywords

Cloud computing , Security

Research Projects

Organizational Units

Journal Issue

Alternative Title

Abstract

This Paper surveys security in cloud computing based on Third Party Auditor (TPA) also known as Trusted Third Party (TTP). There are various security models for safeguarding the client’s data in cloud. TPA provides secure connections between the user and the cloud server. Cloud Service Provider (CSP) Provides the clients with cloud storage and service. TPA has access to the client’s cloud data and all the critical information. There are many security models for making the TPA more reliable so the clients can trust the third party for storing their data. In this paper, we survey mostly the types of security models based on Third Party Auditing in cloud. We also discuss how these security models enable the third parties to gain the clients trust. The classification has been based on the adopted security method as well as on the kind of threats they are addressing.

Description

Citation

Publisher

IEEE

License

Journal

Volume

Issue

PubMed ID

DOI

ISSN

EISSN