IJSRP, Volume 5, Issue 5, May 2015 Edition [ISSN 2250-3153]
Rajendra N. Kankrale, Mahendra B. Gawali
Cloud computing has gained a lot of publicity in the current IT world. After the internet, Cloud computing is the next big thing in the computer world. Cloud computing is the use of the Internet for the tasks performed on the computer and it is the next- generation architecture of IT Industry. Cloud computing is related to different technologies and the convergence of various technologies has emerged to be called cloud computing. Cloud Computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have not been well understood. In this paper, we discuss the design mechanisms that not only protect sensitive data with encrypted data, but also protect customers from malicious behaviors by enabling the validation of the computation result.