An Enhanced Data Storage Technique on Cloud Computing

نویسندگان

چکیده

Exercising a collection of similar numerous easy to get sources and resources over the internet is termed as Cloud Computing A storage system basically large scale that consist many independent servers. During recent years huge changes adoption seen in cloud computing so security has become one major concerns it. As works on third party concern there not only for customers but also service providers. In this paper we have discussed about Cryptography i.e., encrypting messages into certain forms, it’s algorithms including symmetric asymmetric algorithm hashing, its architecture, advantages cryptography.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Enhanced Data Storage Security and Trust Environment in Cloud Computing

Cloud computing plays an important role in data sharing or transfer of information from one place to another. The services provides by the cloud is greatly enjoyed by the user. The storage of the user’s data in the cloud provides the high standard of qualities and more enjoyable services to the users. The data of the user is automatically stored in the cloud without encumber the software and ha...

متن کامل

Data Storage in Cloud Computing

With the development of cloud computing, outsourcing data to cloud server attracts lots of attentions. To guarantee the security and achieve flexibly fine-grained file access control, attribute based encryption (ABE) was proposed and used in cloud storage system. However, user revocation is the primary issue in ABE schemes. In this article, we provide a ciphertextpolicy attribute based encrypti...

متن کامل

Ensuring Data Storage Security in Cloud Computing

Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, h...

متن کامل

Secure Data Storage in Mobile Cloud Computing

In cloud computing highly scalable computing resources are supplied as an outer service through internet on pay-as-usability basis. Portio research [1] estimates that mobile subscribers will reach 6.5 billion by the end of 2012, 6.9 billion by the end of 2013. Due to increasing use of mobile devices the requirement of cloud computing in mobile devices arise, which gave birth to Mobile Cloud Com...

متن کامل

Identity-based data storage in cloud computing

Identity-based proxy re-encryption schemes have been proposed to shift the burden of managing numerous files from the owner to a proxy server. Nevertheless, the existing solutions suffer from several drawbacks. First, the access permission is determined by the central authority, which makes the scheme impractical. Second, they are insecure against collusion attacks. Finally, only queries from t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Indian Journal of Data Communication and Networking (IJDCN)

سال: 2021

ISSN: ['2582-760X']

DOI: https://doi.org/10.35940/ijdcn.b5007.061321