Multi-Cloud Based Secured Storage System
نویسندگان
چکیده
منابع مشابه
Secured Online Control Frame work for multi cloud Storage System using Authorized Deduplication Method
Data deduplication is the specialized and resent compression technology in the cloud computing. In hybrid cloud server storing of repeated data courses many storage management challenges. The data deduplication overcome this challenges by reduce the copy of data and save the space in the cloud service provider (CSP). It also saves the bandwidth of the storage cloud. This deduplication method pr...
متن کاملSecured Cloud Storage using Raptor Codes
Cloud computing has developed as one of the most persuasive paradigms in the IT industry for last few years. To achieve the assertion of cloud data integrity and availability and impose the quality of dependable cloud storage service for users, an effective and flexible distributed scheme with explicit dynamic data support, including block update, delete, and append is designed. Erasure-correct...
متن کاملAgent Based Cloud Storage System
Cloud computing technology is envisioned as the next generation architecture of IT Enterprise. It is defined as a set of scalable data servers or chunk servers that provide computing and storage services to clients. The cloud storage is a relatively basic and widely applied service which can provide users with stable, massive data storage space. Our research shows that the architecture of curre...
متن کاملAn Efficient Secret Sharing-based Storage System for Cloud-based Internet of Things
Internet of things (IoTs) is the newfound information architecture based on the internet that develops interactions between objects and services in a secure and reliable environment. As the availability of many smart devices rises, secure and scalable mass storage systems for aggregate data is required in IoTs applications. In this paper, we propose a new method for storing aggregate data in Io...
متن کاملRemote Data Auditing Scheme in Secured Cloud Storage Environment
Cloud data centers are used to maintain the shared data values for the data owners .Data owners and public verifiers are involved to efficiently audit cloud data integrity without retrieving the entire data from the cloud server. File and block signatures are used in the integrity verification process. Public data auditing schemes are tuned to verify the encrypted cloud storage environment. “On...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: HELIX
سال: 2018
ISSN: 2277-3495,2319-5592
DOI: 10.29042/2018-4019-4023