7.7.1 Data Owners 1. One whose going to access files, one who owns file, who requires his data to be secure. 2. Data owners are responsible for encrypting the data by generating private key. MMCOE, Department of Computer Engineering, 2015-2016 26 Regeneration of code based cloud storage 3. Data/File is encrypted using AES Algorithm. 4. Data owner sends data/file to TPA and takes help of TPA. 5. Data owner is provided with log window to see how TPA is working and get report of the same. 6. Data owner pays to TPA to get security of its data and can access valuable data at anytime. 7.7.2 Cloud Server 1. One whose going to access files, one who owns file, who requires his data to be secure. 2. Two different servers are used to store half half information …show more content…
TPA is responsible for splitting data/file into two parts so as to secure the data. 4. Attacker can attack either of the servers or both. Attacking both servers can be rare , there is a possibility of attacking one server at a time. 5. Ever since data is in encrypted format, its probably difficult for attacker to decode it ; but this will ultimately lead to data owner to suffer in one or the other way. 6. In order to solve this problem metadata is stored for each server content into proxy server. 7. Suppose size of data stored in server 1 is 2GB and similarly size of data stored in server2 is 2 GB. So backup of these two servers require 2GB space. 8. If we are using metadata to store backup of these servers it will probably require less storage size i.e less than 2 GB. 7.7.3 TPA(Third Party Auditor) 1. There are basically three types of audits product, process and system. Audits are name according to there purpose. 2. Audits are classified into internal or external, depending upon relationship of participants. 3. Internal audits are performed within an organization by employees. 4. External audits are performed by Third party agent or outside agents. 5. Audit is performed by an organization free from customer supplier