Security in Cloud Computing Based on Third Party Auditor: A Survey

Loading...
Thumbnail Image
Authors
Ben Haj Frej, Mohamed
Dichter, Julius
Gupta, Navarun
Issue Date
2016-10-14
Type
Presentation
Language
en_US
Keywords
Cloud computing , Security
Research Projects
Organizational Units
Journal Issue
Alternative Title
Abstract
This Paper surveys security in cloud computing based on Third Party Auditor (TPA) also known as Trusted Third Party (TTP). There are various security models for safeguarding the client’s data in cloud. TPA provides secure connections between the user and the cloud server. Cloud Service Provider (CSP) Provides the clients with cloud storage and service. TPA has access to the client’s cloud data and all the critical information. There are many security models for making the TPA more reliable so the clients can trust the third party for storing their data. In this paper, we survey mostly the types of security models based on Third Party Auditing in cloud. We also discuss how these security models enable the third parties to gain the clients trust. The classification has been based on the adopted security method as well as on the kind of threats they are addressing.
Description
Citation
Publisher
IEEE
License
Journal
Volume
Issue
PubMed ID
DOI
ISSN
EISSN