An Approach for Ensuring Security in Cloud Environment
نویسندگان
چکیده
منابع مشابه
Ensuring Data Storage Security in Cloud Computing
Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, h...
متن کاملEnsuring Security Proof in Cloud Network
Cloud Computing is developed and used by all enterprise in world to outsource their data. To maintain confidentiality of shared data against entrusted party encryption of data is important. Many scheme is introduced to achieve security of outsource data in cloud .But they fails to achieve data integrity in cloud. Sometimes entrusted cloud service provider modifies or deletes the data without ge...
متن کاملAn Approach for Ensuring Security and its Verification
In this paper a new symmetric key cryptographic algorithm has been designed. The algorithm is enriched with various calculations through which the ciphertext becomes unpredictable and breaking the security by eavesdropper becomes harder. In terms of properties of Petri net and the analysis technique of reachability tree, the protocol was proved to be boundedness, deadlock free and liveness. Key...
متن کاملAn Efficient Model for Providing Security in Cloud computing Environment
All rights reserved by www.ijsrd.com 2593 Abstract--In this paper, we present a hybrid model for providing security in cloud computing environment. This model combines the advantages of two most popular existing cloud security models. The first model is hierarchical model and the other one is third party auditor based model. In this paper, we present an overview of existing cloud security algor...
متن کاملAn Efficient Model for Providing Security in Cloud Computing Environment
In this paper, we present an overview of existing cloud security algorithms. All these algorithms are described more or less on their own. Cloud security is a very popular task. We also explain the fundamentals of sequential rule mining. We describe today’s approaches for cloud security. From the broad variety of efficient algorithms that have been developed we will compare the most important o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2014
ISSN: 0975-8887
DOI: 10.5120/15760-4420