3-Confidentiality: In this model we achieve the security function of confidentiality to protect the user`s personal information. This is related to authorization, as confidentiality of data is maintained when only allowing …show more content…
The storage provider has to be verified otherwise he is untrusted. This is considered the most important feature in any provider. The model will overcome the problem of storage provider verification by putting strict conditions to choice the provider to be a trustworthy person such as honest, reliability, fidelity and has a conscience springy…. etc. In case of ensuring that the provider is not a trusted person we will be able to take the decision not to sell storage space to him.
8-Secure Even after Loss of User Identity and Password: We provide the security of our system for after loss of user identity or password to be secured. We provide the system by an option of forget password to help user to access the system when forgetting or losing the user identity or password.
9-Indexing of data: Increasing the amount of data transferred within the cloud leads to system overloading and reduces the sufficiency of the system. Data owner uploads data on the cloud then assigns rights to users to download these data therefore; he can reduce the amount of data transferred through controlling the number of users allowed to download it. Indexing will facilitate the deployment of database back-end applications whether on private cloud or public