Downloads: 106 | Views: 278 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper | Computer Science & Engineering | India | Volume 5 Issue 6, June 2016 | Popularity: 7.2 / 10
Optimized Storage and Secured Data Transaction in Cloud Environment using ECC and Huffman Encoding
Saket Nigam, Rekhansh Rao
Abstract: Cloud Computing services addresses the problems of privacy and security. For providing such services, it takes the help of internet. It helps users in accessing files and using applications. These services can be used according to user's demand and usage requirements. It helps in storing data from more than one client. It grants remote access of data to users. It saves cost and there is no need for buying storage devices. It also helps in preventing loss of information system failure. Cloud computing is a computing structure in which computer infrastructure resources are provided as service to users. This is done through the help of internet. This technology helps in accessing their files and application remotely. It can be done through any other computer. Cloud based services include software, platform & infrastructure as services. These services allows users to take benefits of such services where as demand arises. These services are usage based and are purchased on the basis of need & timely requirements. These area unit several benefits of cloud storage of information, however the most problems area unit associated with security & access management as a results information |of information} storage on severs don't seem to be at intervals constant positive domain as knowledge householders. For the purpose of security & maintenance of confidentiality, cryptography is used. all this is done from the help of internet. Cloud storage provides a platform for applications and infrastructure related services. Most of the information, which is store in cloud is sensitive.
Keywords: Access control, Authentication, Attribute-based signature, Attribute-based encription, cloud storage, cast minimizing
Edition: Volume 5 Issue 6, June 2016
Pages: 1371 - 1376
DOI: https://www.doi.org/10.21275/NOV164529
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022
Pages: 629 - 634A Face Spoof Detection using Feature Extraction and SVM
Lovely Pal, Renuka Singh
Downloads: 0
Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023
Pages: 581 - 585Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security
R. Vidhya, R. Sathya
Downloads: 1
Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021
Pages: 475 - 485Light Weight WSN Authentication Protocol Suite
Rahul K Drolia
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Informative Article, Computer Science & Engineering, India, Volume 12 Issue 6, June 2023
Pages: 2966 - 2970Security in Kubernetes: A Comprehensive Review of Best Practices
Dinesh Reddy Chittibala
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024
Pages: 1490 - 1494An Efficient Secure Data Aggregation Strategy in Wireless Sensor Network using MAC Authentication
Mamta, Dr. Shiva Prakash