Large Scale Data Shared by Peer to Peer Based System in Shared Network
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 107 | Views: 305

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 6, June 2015 | Popularity: 6.2 / 10


     

Large Scale Data Shared by Peer to Peer Based System in Shared Network

Bhavsar Harshada V., Dr. S. V. Gumaste, Prof. Deokate Gajanan S.


Abstract: Recently, the amount of delicate data produced by many executives is out treading their storage ability. The management of such large amount of data is quite exclusive due to the requirements of high storage capacity and qualified recruits. Storage-as-a-Service (SaaS) offered by cloud service providers (CSPs) is a paid facility that enables organizations to outsource their data to be stored on remote servers. Thus, SaaS decreases the maintenance cost and diminishes the burden of large local data storage at the organizations end. A data owner pays for a desired level of security and must get some benefit in case of any difficulties dedicated by the CSP. On the other hand, the CSP needs a protection from any false accusation that may be claimed by the owner to get illegal damages. This paper, proposes a scheme that is used cloud storage system which has efficiency to store large amount of data by the CSP and create trust among them.


Keywords: Cloud computing, Map Reduce, Network Security, Peer-to-peer systems, Query processing


Edition: Volume 4 Issue 6, June 2015


Pages: 2762 - 2766



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Bhavsar Harshada V., Dr. S. V. Gumaste, Prof. Deokate Gajanan S., "Large Scale Data Shared by Peer to Peer Based System in Shared Network", International Journal of Science and Research (IJSR), Volume 4 Issue 6, June 2015, pp. 2762-2766, https://www.ijsr.net/getabstract.php?paperid=SUB156129, DOI: https://www.doi.org/10.21275/SUB156129

Similar Articles

Downloads: 4 | Weekly Hits: ⮙2 | Monthly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024

Pages: 779 - 789

Machine Learning-Based Detection of Synonymous IP Flood Attacks on Server Infrastructure

Surbhi Batra, Chandra Sekhar Dash

Share this Article

Downloads: 5 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article, Computer Science & Engineering, India, Volume 11 Issue 8, August 2022

Pages: 1497 - 1500

Innovative Approach to Mitigate Man-in-the-Middle Attacks in Secure Communication Channels

Arnab Dey

Share this Article

Downloads: 5 | Weekly Hits: ⮙5 | Monthly Hits: ⮙5

Analysis Study Research Paper, Computer Science & Engineering, Saudi Arabia, Volume 13 Issue 3, March 2024

Pages: 1927 - 1929

Optimizing Network Security through Inline Sandbox Deployment: A Practical Approach with Trellix

Tahir Bashir

Share this Article

Downloads: 9 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 13 Issue 3, March 2024

Pages: 882 - 886

Maximizing Cyber Security through Machine Learning and Data Analysis for Advanced Threat Detection and Mitigation

Manupreet Kaur

Share this Article

Downloads: 103 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1728 - 1731

Key Management in Wireless Sensor Networks - A Review

Majida C V, Sandhya V

Share this Article
Top