International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 106 | Views: 278 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 6, June 2016 | Popularity: 7.2 / 10


     

Optimized Storage and Secured Data Transaction in Cloud Environment using ECC and Huffman Encoding

Saket Nigam, Rekhansh Rao


Abstract: Cloud Computing services addresses the problems of privacy and security. For providing such services, it takes the help of internet. It helps users in accessing files and using applications. These services can be used according to user's demand and usage requirements. It helps in storing data from more than one client. It grants remote access of data to users. It saves cost and there is no need for buying storage devices. It also helps in preventing loss of information system failure. Cloud computing is a computing structure in which computer infrastructure resources are provided as service to users. This is done through the help of internet. This technology helps in accessing their files and application remotely. It can be done through any other computer. Cloud based services include software, platform & infrastructure as services. These services allows users to take benefits of such services where as demand arises. These services are usage based and are purchased on the basis of need & timely requirements. These area unit several benefits of cloud storage of information, however the most problems area unit associated with security & access management as a results information |of information} storage on severs don't seem to be at intervals constant positive domain as knowledge householders. For the purpose of security & maintenance of confidentiality, cryptography is used. all this is done from the help of internet. Cloud storage provides a platform for applications and infrastructure related services. Most of the information, which is store in cloud is sensitive.


Keywords: Access control, Authentication, Attribute-based signature, Attribute-based encription, cloud storage, cast minimizing


Edition: Volume 5 Issue 6, June 2016


Pages: 1371 - 1376


DOI: https://www.doi.org/10.21275/NOV164529



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Saket Nigam, Rekhansh Rao, "Optimized Storage and Secured Data Transaction in Cloud Environment using ECC and Huffman Encoding", International Journal of Science and Research (IJSR), Volume 5 Issue 6, June 2016, pp. 1371-1376, https://www.ijsr.net/getabstract.php?paperid=NOV164529, DOI: https://www.doi.org/10.21275/NOV164529



Similar Articles

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022

Pages: 629 - 634

A Face Spoof Detection using Feature Extraction and SVM

Lovely Pal, Renuka Singh

Share this Article

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023

Pages: 581 - 585

Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security

R. Vidhya, R. Sathya

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article, Computer Science & Engineering, India, Volume 12 Issue 6, June 2023

Pages: 2966 - 2970

Security in Kubernetes: A Comprehensive Review of Best Practices

Dinesh Reddy Chittibala

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024

Pages: 1490 - 1494

An Efficient Secure Data Aggregation Strategy in Wireless Sensor Network using MAC Authentication

Mamta, Dr. Shiva Prakash

Share this Article
Top