Auditing Scheme for Secure Cloud Storage
R Yogesh Rajkumar1, K P Kaliyamurthie2

1R Yogesh Rajkumar, Research Scholar, BIHER- Bharath Institute of Higher Education and Research, Chennai (Tamil Nadu), India.
2K P Kaliyamurthie, Department of Computer Science and Engineering, BIHER- Bharath Institute of Higher Education and Research, Chennai (Tamil Nadu), India.

Manuscript received on 18 June 2019 | Revised Manuscript received on 25 June 2019 | Manuscript published on 30 June 2019 | PP: 2624-2626 | Volume-8 Issue-5, June 2019 | Retrieval Number: E7828068519/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Honey words are created dependent on the user information gave and the first password is changed over into another organization and put away alongside the Honey words. This undertaking convey Intermediate server, shopping server for buy and Cloud server for keeping up user record subtleties. Attacker who realizes the E mail record of unique user can without much of a stretch reset the password of the cloud server. Presently attacker logins into the buy entry, where he is been followed unconsciously and he is permitted to do buy. Server distinguishes the attacker and sends the data to the Original proprietor and furthermore it hinders the attacker notwithstanding doing exchange from his unique record.
Keywords: Honey words, Cloud Computing, Security and Storage.

Scope of the Article: Cloud Computing