Indian Journal of Science and Technology
DOI: 10.17485/ijst/2016/v9i19/93864
Year: 2016, Volume: 9, Issue: 19, Pages: 1-7
Original Article
K. Vijayalakshmi1 *, K. S. Fathimathus Zohra1 and A. Anny Leema2
1Department of MCA, Ethiraj College for Women, Chennai - 600008, Tamil Nadu, India; [email protected], [email protected] 2Department of MCA, B. S. Abdur Rahman University, Chennai - 600048, Tamil Nadu, India; [email protected]
*Author for correspondence
K. Vijayalakshmi
Department of MCA, Ethiraj College for Women, Chennai - 600008, Tamil Nadu, India; [email protected]
Cloud computing are in demand for various technical needs. The way the data processing is done to reach cloud servers and the way of making the service protective and free form XSS Attack determines the success. The objective of this study is to design a method which can moderate XSS attacks. Methodology: The integrity testing protocol must be efficient in order to save the cost. From these two points, the proposed secure cloud transmission protocol SC-TPDP is developed and designed which moderates XSS attacks. This framework design facts will help in increasing a secure protocol for the customers who are using cloud computing technologies over unconfident internet. Remote data reliability testing model: SC-TPDP (Secure Cloud Transmission provable data Possession) in multi-cloud storage. Based on the bilinear pairings, a SC-TPDP protocol is designed. Findings/Improvements: The proposed SC-TPDP protocol is provably secure under the efficient of the Blowfish Algorithm. In addition to the advantage of removal of certificate management, the SC-TPDP protocol is also efficient and flexible. Based on the client’s authorization, the proposed SC-TPDP protocol can recognize private verification, delegated verification, public verification and tracking attackers/hackers from client authorization. Application: The SC-TPDP protocol focuses on securing cloud provable data possession in multi-cloud storage from XSS attack. This protocol is secure and minimizes the attacker’s entry, thus protecting cloud end user from XSS attack.
Keywords: Blowfish Cryptography, Cloud Computing, Hackers Protection, Provable Data Possession, SC-TPDP, TOTP, XSS Attack Protection
Subscribe now for latest articles and news.