A Secure Protocol for information Storage on cloud Database
Keywords:Cloud computing, data integrity, cloud security, Third Party Auditor (TPA).
Cloud technology has opened up new opportunities for storing and sharing data. It enables individuals and businesses to store their data securely and access it from anywhere in the world. However, existing cloud storage solutions are vulnerable to malicious attacks. This paper presents a secure protocol for information storage on cloud. The protocol is based on a three-layer architecture that comprises a transport layer, an application layer and a security layer. The transport layer handles the data transfer between the cloud provider and a user's device. The application layer contains a set of functions and services that enable users to manage and access their data stored on the cloud. Finally, the security layer provides enhanced security features that protect the data stored on the cloud, while also ensuring data integrity and confidentiality. The protocol is designed to be secure, scalable, and easy to use. Furthermore, the protocol can be extended to support additional security features, such as the use of encryption, two-factor authentication, and the provision of audit logs. This paper provides a detailed explanation of the protocol and its security features.