International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 111 | Views: 286

Review Papers | Computer Science & Engineering | India | Volume 2 Issue 2, February 2013 | Popularity: 6.3 / 10


     

Ensuring Security Services for Data Storing and Data Sharing in Cloud Computing

D. Raman, Bojja Vamshikrishna


Abstract: Cloud computing make it possible to store large amounts of data. To monitoring User an entity whose data to be stores in the cloud and relies on the cloud for data storage and computation, server is an entity which manages by cloud service provider to provide data storage service and has significant storage space and computation resources and third party is an optional TPA who has expertise and capabilities that users may not have is trusted to assess and expose risk of cloud storage services on behalf of the users upon request. Our proposed work cloud computing architecture for analysis is cloud data storage a user stores his data through a CSP into set of cloud servers which are running in a simultaneous cooperated and distributed. We are proving an option to the user while uploading that is this file is public or group or private for data sharing. Considering the cloud data are dynamic in nature, the proposed design further supports secure and efficient dynamic operations on outsourced data, including block modification, deletion, and append.


Keywords: Cloud computing architecture, Data integrity, Data sharing


Edition: Volume 2 Issue 2, February 2013


Pages: 609 - 613



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
D. Raman, Bojja Vamshikrishna, "Ensuring Security Services for Data Storing and Data Sharing in Cloud Computing", International Journal of Science and Research (IJSR), Volume 2 Issue 2, February 2013, pp. 609-613, https://www.ijsr.net/getabstract.php?paperid=IJSRON2013521, DOI: https://www.doi.org/10.21275/IJSRON2013521



Similar Articles

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021

Pages: 1659 - 1668

Anomaly Detection: Enhancing Systems with Machine Learning

Yogananda Domlur Seetharama

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024

Pages: 1490 - 1494

An Efficient Secure Data Aggregation Strategy in Wireless Sensor Network using MAC Authentication

Mamta, Dr. Shiva Prakash

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 9, September 2024

Pages: 1075 - 1080

Improving Health Information Security in Mobile Cloud Computing with Blockchain and Modular Encryption Techniques

Vikasa Bheemashankara Pateela, K Rahul Krishna, Dr. Krishna Kumar P R, Triveni N

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 10 Issue 9, September 2021

Pages: 1793 - 1802

Event - Driven Architecture: Building Responsive and Scalable Systems

Venkata Naga Sai Kiran Challa

Share this Article

Downloads: 5 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022

Pages: 772 - 776

Cryptographic Algorithm to Augment Data Security

Vipin R Bharadwaj, Nalina V, Rithvik Mohan V

Share this Article



Top