Downloads: 130 | Views: 308
Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 12, December 2015 | Popularity: 6.3 / 10
A Survey on Safe Information Sharing and Query Processing Via Organization of Cloud Computing
Shraddha Jadhav
Abstract: Here, we are going to examine security issues for distributed computing and present a layered structure for secure mists and after that attention on two of the layers, i. e. , the capacity layer and the information layer. Distributed computing is an arrangement of IT administrations that are given to a client over a system on a rented premise and with the capacity to scale up or down their administration necessities. Typically distributed computing administrations are conveyed by an outsider supplier who claims the base. It points of interest to specify yet a couple incorporate adaptability, strength, adaptability, proficiency and outsourcing non-center exercises. This paper will chat secure unified inquiry handling with guide Reduce and Hadoop, and examine the utilization of secure coprocessors for distributed computing. Distributed computing offers a creative plan of action for associations to receive IT administrations without forthright venture. Regardless of the potential additions accomplished from the distributed computing, the associations are moderate in tolerating it because of security issues and difficulties connected with it. Security is one of the real issues which hamper the development of cloud. The thought of giving over essential information to another organization is troubling, such that the buyers need to be careful in comprehension the dangers of information ruptures in this new environment. This paper presents a nitty gritty examination of the distributed computing security issues and difficulties concentrating on the distributed computing sorts and the administration conveyance sorts.
Keywords: Cloud computing, Security, Data Storage, Data Encryption, Data Decryption
Edition: Volume 4 Issue 12, December 2015
Pages: 43 - 47
DOI: https://www.doi.org/10.21275/NOV151857
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 2000
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 718
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 698
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 698
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 687
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera