UB ScholarWorks

Security in Cloud Computing Based on Third Party Auditor: A Survey

Show simple item record

dc.contributor.author Ben Haj Frej, Mohamed
dc.contributor.author Dichter, Julius
dc.contributor.author Gupta, Navarun
dc.date.accessioned 2017-04-13T15:27:58Z
dc.date.available 2017-04-13T15:27:58Z
dc.date.issued 2016-10-14
dc.identifier.uri https://scholarworks.bridgeport.edu/xmlui/handle/123456789/1952
dc.description.abstract This Paper surveys security in cloud computing based on Third Party Auditor (TPA) also known as Trusted Third Party (TTP). There are various security models for safeguarding the client’s data in cloud. TPA provides secure connections between the user and the cloud server. Cloud Service Provider (CSP) Provides the clients with cloud storage and service. TPA has access to the client’s cloud data and all the critical information. There are many security models for making the TPA more reliable so the clients can trust the third party for storing their data. In this paper, we survey mostly the types of security models based on Third Party Auditing in cloud. We also discuss how these security models enable the third parties to gain the clients trust. The classification has been based on the adopted security method as well as on the kind of threats they are addressing. en_US
dc.language.iso en_US en_US
dc.publisher IEEE en_US
dc.subject Cloud computing en_US
dc.subject Security en_US
dc.title Security in Cloud Computing Based on Third Party Auditor: A Survey en_US
dc.type Presentation en_US
dc.institute.department School of Engineering en_US
dc.institute.name University of Bridgeport en_US
dc.event.location Bridgeport, CT en_US
dc.event.name 2016 Annual Connecticut Conference on Industrial Electronics, Technology and Automation (CT-IETA) en_US

Files in this item

This item appears in the following Collection(s)

Show simple item record

Search ScholarWorks

Advanced Search


My Account