Downloads: 107 | Views: 305
Research Paper | Computer Science & Engineering | India | Volume 4 Issue 6, June 2015 | Popularity: 6.2 / 10
Large Scale Data Shared by Peer to Peer Based System in Shared Network
Bhavsar Harshada V., Dr. S. V. Gumaste, Prof. Deokate Gajanan S.
Abstract: Recently, the amount of delicate data produced by many executives is out treading their storage ability. The management of such large amount of data is quite exclusive due to the requirements of high storage capacity and qualified recruits. Storage-as-a-Service (SaaS) offered by cloud service providers (CSPs) is a paid facility that enables organizations to outsource their data to be stored on remote servers. Thus, SaaS decreases the maintenance cost and diminishes the burden of large local data storage at the organizations end. A data owner pays for a desired level of security and must get some benefit in case of any difficulties dedicated by the CSP. On the other hand, the CSP needs a protection from any false accusation that may be claimed by the owner to get illegal damages. This paper, proposes a scheme that is used cloud storage system which has efficiency to store large amount of data by the CSP and create trust among them.
Keywords: Cloud computing, Map Reduce, Network Security, Peer-to-peer systems, Query processing
Edition: Volume 4 Issue 6, June 2015
Pages: 2762 - 2766
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 4 | Weekly Hits: ⮙2 | Monthly Hits: ⮙4
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024
Pages: 779 - 789Machine Learning-Based Detection of Synonymous IP Flood Attacks on Server Infrastructure
Surbhi Batra, Chandra Sekhar Dash
Downloads: 5 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Informative Article, Computer Science & Engineering, India, Volume 11 Issue 8, August 2022
Pages: 1497 - 1500Innovative Approach to Mitigate Man-in-the-Middle Attacks in Secure Communication Channels
Arnab Dey
Downloads: 5 | Weekly Hits: ⮙5 | Monthly Hits: ⮙5
Analysis Study Research Paper, Computer Science & Engineering, Saudi Arabia, Volume 13 Issue 3, March 2024
Pages: 1927 - 1929Optimizing Network Security through Inline Sandbox Deployment: A Practical Approach with Trellix
Tahir Bashir
Downloads: 9 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Review Papers, Computer Science & Engineering, India, Volume 13 Issue 3, March 2024
Pages: 882 - 886Maximizing Cyber Security through Machine Learning and Data Analysis for Advanced Threat Detection and Mitigation
Manupreet Kaur
Downloads: 103 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1728 - 1731Key Management in Wireless Sensor Networks - A Review
Majida C V, Sandhya V