Accessing Secured Data in Cloud Computing Environment
نویسندگان
چکیده
منابع مشابه
Accessing Secured Data in Cloud Computing Environment
Number of businesses using cloud computing has increased dramatically over the last few years due to the attractive features such as scalability, flexibility, fast start-up and low costs. Services provided over the web are ranging from using provider’s software and hardware to managing security and other issues. Some of the biggest challenges at this point are providing privacy and data securit...
متن کاملData Replication-Based Scheduling in Cloud Computing Environment
Abstract— High-performance computing and vast storage are two key factors required for executing data-intensive applications. In comparison with traditional distributed systems like data grid, cloud computing provides these factors in a more affordable, scalable and elastic platform. Furthermore, accessing data files is critical for performing such applications. Sometimes accessing data becomes...
متن کاملAn Efficient Resource Allocation for Processing Healthcare Data in the Cloud Computing Environment
Nowadays, processing large-media healthcare data in the cloud has become an effective way of satisfying the medical userschr('39') QoS (quality of service) demands. Providing healthcare for the community is a complex activity that relies heavily on information processing. Such processing can be very costly for organizations. However, processing healthcare data in cloud has become an effective s...
متن کاملA Survey Report on Secured Data Outsourcing in Cloud Computing
Cloud computing allows for an economically promising paradigm of computation outsourcing. Nonetheless, the way to look after buyer’s exclusive data processed and generated for the period of the computation is becoming the foremost security quandary. Focusing on engineering computing and optimization duties, this paper investigates at ease outsourcing of commonly applicable linear programming (L...
متن کاملRemote Data Auditing Scheme in Secured Cloud Storage Environment
Cloud data centers are used to maintain the shared data values for the data owners .Data owners and public verifiers are involved to efficiently audit cloud data integrity without retrieving the entire data from the cloud server. File and block signatures are used in the integrity verification process. Public data auditing schemes are tuned to verify the encrypted cloud storage environment. “On...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Network Security & Its Applications
سال: 2015
ISSN: 0975-2307,0974-9330
DOI: 10.5121/ijnsa.20157102