IJSRP, Volume 3, Issue 4, April 2013 Edition [ISSN 2250-3153]
Mrs.Aruna A, Ms.Suganya N, Ms.KeerthanaAnandhi N , Ms.Priyanka A
Distributed considerations are the major acquiring epitome. The domain abbreviates monetary value related on computation. The service provided on scattered location to its users on demand across the cyberspace. The data and other resources used by the user are stored in the open environment. The circumstance issues more on data security and user fear on missing bound on their data. To enrich security on data, the security mechanisms are implemented, though the data integrity is unnoticed to user. To overcome the problem and achieve data integrity the method of auditing is established through Third Party Auditing (TPA). In addition to auditing the sensitive data in uploading over the dispersed area are protected by DES encryption algorithm.