An Approach for Ensuring Security in Cloud Environment

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Ensuring Data Storage Security in Cloud Computing

Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, h...

متن کامل

Ensuring Security Proof in Cloud Network

Cloud Computing is developed and used by all enterprise in world to outsource their data. To maintain confidentiality of shared data against entrusted party encryption of data is important. Many scheme is introduced to achieve security of outsource data in cloud .But they fails to achieve data integrity in cloud. Sometimes entrusted cloud service provider modifies or deletes the data without ge...

متن کامل

An Approach for Ensuring Security and its Verification

In this paper a new symmetric key cryptographic algorithm has been designed. The algorithm is enriched with various calculations through which the ciphertext becomes unpredictable and breaking the security by eavesdropper becomes harder. In terms of properties of Petri net and the analysis technique of reachability tree, the protocol was proved to be boundedness, deadlock free and liveness. Key...

متن کامل

An Efficient Model for Providing Security in Cloud computing Environment

All rights reserved by www.ijsrd.com 2593 Abstract--In this paper, we present a hybrid model for providing security in cloud computing environment. This model combines the advantages of two most popular existing cloud security models. The first model is hierarchical model and the other one is third party auditor based model. In this paper, we present an overview of existing cloud security algor...

متن کامل

An Efficient Model for Providing Security in Cloud Computing Environment

In this paper, we present an overview of existing cloud security algorithms. All these algorithms are described more or less on their own. Cloud security is a very popular task. We also explain the fundamentals of sequential rule mining. We describe today’s approaches for cloud security. From the broad variety of efficient algorithms that have been developed we will compare the most important o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Applications

سال: 2014

ISSN: 0975-8887

DOI: 10.5120/15760-4420