Open Access
Subscription Access
Open Access
Subscription Access
A Safe Mechanism for Handling Data in Free Cloud
Subscribe/Renew Journal
In this genuine those distributed computing, require make a cloud sensibly be normal enter for offering enrolling resources. On the off chance that it require disseminating enrolling organization insignificantly over Hosting neighbourhood servers or individual units ought to control applications, there would extreme protection nerves to administration data. The present structure requires help developed with cruel security arranges yet it require precisely issues. Those considerations are equivalent discrete duty, certifiable data possession, outcast Inspecting are secure regardless it require precisely issues. With give enough security straight forwardly cloud A little examine need been settled on around past flawless we suggest another structure recognized Likewise uniqueness constructed data dealing with and data checking transparently cloud which accomplishments those welfares for quantum instruments ought to asylum open database. We took a part reference in which cruel open cloud server, director Furthermore client would given with secure relationship with our expected piece of information which use optional Prophet display. Our honest to goodness taking in need both achievement what is more dissatisfaction rates with isolated also typical Clouds separately. Various customers might need to accumulate their larger part of the information on typical cloud servers along the side with those quick improvement about cloud enrolling. New wellbeing issue must make decided so as on sponsorship All the more customers change their data secured close by consistent cloud.
Keywords
Distributed Computing, Open Cloud Server, Server.
User
Subscription
Login to verify subscription
Font Size
Information
- Z. Fu, X. Sun, Q. Liu, L. Zhou, and J. Shu, “Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing,” IEICE Transactions on Communications, vol. E98-B, no. 1, pp.190-200, 2015.
- Y. Ren, J. Shen, J. Wang, J. Han, and S. Lee, “Mutual verifiable provable data auditing in public cloud database,” Journal of Internet Technology, vol. 16, no. 2, pp. 317-323, 2015.
- E. Kirshanova, “Proxy re-encryption from lattices,” PKC 2014, LNCS 8383, pp. 77-94, 2014.
- H. Guo, Z. Zhang, and J. Zhang, “Proxy re-encryption with unforgeable re-encryption keys,” Cryptology and Network Security, LNCS 8813, pp. 20-33, 2014.
- P. Xu, H. Chen, D. Zou, and H. Jin, “Fine-grained and heterogeneous proxy re-encryption for secure cloud storage,” Chinese Science Bulletin, vol. 59, no. 32, pp. 4201-4209, 2014.
- E. Esiner, A. Kupcu, and O Ozkasap, “Analysis and optimization on FlexDPDP: A practical solution for dynamic provable data possession,” Intelligent Cloud Computing, LNCS 8993, pp. 65-83, 2014.
- H. Wang, “Identity-based distributed provable data possession in multicloud database,” IEEE Transactions on Services Computing, vol. 8, no. 2, pp. 328-340, 2015.
- H. Wang, “Anonymous multi-receiver remote data retrieval for pay-tv in public clouds,” IET Information Security, vol. 9, no. 2, pp. 108-118, 2015.
- Q. Zheng, and S. Xu, “Fair and dynamic proofs of retrievability,” CODASPY’11, pp. 237-248, 2011.
- S. Saravanan, and I. Arivarasan, “An efficient ranked keyword search for effective utilization of outsourced cloud data,” Journal of Global Research in Computer Science, vol. 4, no. 4, pp. 8-12, 2014.
- S. Saravanan, and V. Venkatachalam, “Improving map reduce task scheduling and micro-partitioning mechanism for mobile cloud multimedia services,” International Journal of Advanced Intelligence Paradigms, vol. 8, no. 2, pp. 157-167, 2016.
- S. Saravanan, and V. Venkatachalam, “Advance map reduce task scheduling algorithm using mobile cloud multimedia services architecture,” IEEE Digital Explore, pp. 21-25, 2014.
- S. Swathi, “Preemptive virtual machine scheduling using CLOUDSIM tool,” International Journal of Advances in Engineering, vol. 1, no. 3, pp. 323-327, 2015.
- S. Saravanan, V. Venkatachalam, and S. T. Malligai, “Optimization of SLA violation in cloud computing using artificial bee colony,” International Journal of Advances in Engineering, vol. 1, no. 3, pp. 410-414, 2015.
- S. Thilagamani, and N. Shanthi, “Literature survey on enhancing cluster quality,” International Journal on Computer Science and Engineering, vol. 2, no. 6, pp. 1999-2002, 2010.
- T. Mekala, and R. Vikram, “Improve the efficiency of physical resources utilization on cloud computing by classifying virtualization strategy,” International Journal of Emerging Technology & Research.
- P. Sudhakar, and B. P. Devi, “A Survey on TaaS & SECaaS in cloud environment,” Journal of Advances in Chemistry, vol. 12, no. 15, pp. 4795-4798, 2016.
- B. P. Devi, S. Chitra, and B. Madhusudhanan, “Improving security in portable medical devices and mobile health care system using trust,” Journal of Medical Imaging and Health Informatics, vol. 6, no. 8, pp. 1955-1960, 2016.
Abstract Views: 386
PDF Views: 7