SlideShare a Scribd company logo
1 of 3
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 415
CLOUD STORAGE LIMIT MONITORING MEASURES
Jayachandran.R1
1
Department of CSE, saveetha school of Engineering, chennai
Abstract
We are well aware that cloud storage is becoming very popular and also in wide use nowadays. it is one of the best infrastructure
based service. in this paper, we are going to introduce the measures that can be taken to monitor the cloud storages. this is important
because, one should be always aware of the storage status of the cloud. so that he can decide what whether he should get some more
space in the cloud or to delete the datum from the existing cloud and remain using the same.
This measures also use the mobile smart phones to indicate the status of the cloud storage, so that one need not login to the cloud
storage every time, when he want to know the status.
----------------------------------------------------------------------***--------------------------------------------------------------------
1. INTRODUCTION
In this technique we are going to use mobile phones and
computers to indicate the storage limit and we also use the
effective communication between the phones and the
computers connected to the internet.
2. SMART PHONE
A smartphone, or smart phone, is a mobile phone with more
advanced computing capability and connectivity than basic
feature phones.
Early smartphones typically combined the features of a mobile
phone with those of another popular consumer device, such as
a personal digital assistant (PDA), a media player, adigital
camera.
Modern smartphones include all of those features plus the
features of a touchscreen computer, including web browsing,
Wi-Fi, and 3rd-party apps.
Currently, about 90% of handset sales worldwide are for
devices
3. CLOUD STORAGE
Cloud storage is a model of networked enterprise storage
where data is stored in virtualized pools of storage which are
generally hosted by third parties. Hosting companies operate
large data centers, and people who require their data to be
hosted buy or lease storage capacity from them. The data
center operators, in the background, virtualize the resources
according to the requirements of the customer and expose
them as storage pools, which the customers can themselves
use to store files or data objects. Physically, the resource may
span across multiple servers and multiple locations. The safety
of the files depends upon the hosting companies, and on the
applications that leverage the cloud storage.
Cloud storage services may be accessed through a web service
application programming interface (API) or by applications
that utilize the API, such as cloud desktop storage, acloud
storage gateway or Web-based content management systems.
4. INTERNET
The Internet is a global system of interconnected computer
networks that use the standard Internet protocol suite (TCP/IP)
to link several billion devices worldwide. It is a network of
networks that consists of millions of private, public, academic,
business, and government networks, of local to global scope,
that are linked by a broad array of electronic, wireless, and
optical networking technologies. The Internet carries an
extensive range of information resources and services, such as
the inter-linked hypertextdocuments and applications of the
World Wide Web (WWW), the infrastructure to support email,
and peer-to-peer networks for file sharing and telephony.
5. PROCESS
The process is made very simple here.the process needs the
mobile smartphone with the data connection.
A computer with the internet connection (that is used by the
user)
The process starts with synchronizing the mobile with the
cloud storage.mobile is programmed in such a way that the
mobile monitors the storage space of the cloud continuously.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 416
The mobile phone is connected to computer with internet as
well so that the mobile can communicate to computer about
the status of the cloud storage.
When the cloud storage is full the cloud sends the warning
message to the mobile.
The mobile that is synchronized with the computers
communicates to the computers that the storage is full and
they cannot update anymore files.
Then the computer starts sending files to the cloud.
6. THE COMPLETE PROCESS
The mobile smart phone is connected to the cloud. the smart
phone is also connected with the computer with the internet.
when the cloud storage is full the cloud sends the warning
message that the cloud storage is full. then the mobile sends
the error message to the computer. then the computer stops
sending the files to the cloud.
7. CONCLUSIONS
With the measures introduced in this paper it is very much
possible to monitor the cloud storage space and thereby have
the idea of the cloud storage limit is filled or not.
REFERENCES
[1] Z. Wilcox-O'Hearn and B. Warner, "Tahoe: the least-
authority filesystem," in StorageSS, 2008, pp. 21-26.
Full Text: Access at ACM
[2] K. D. Bowers, A. Juels, and A. Oprea, "HAIL: A High-
Availability and Integrity Layer for Cloud Storage," in
16th ACM Conference on Computer and
Communications Security, CCS '09. ACM, 2009, pp.
187-198. Full Text: Access at ACM
[3] R. A. Popa, J. Lorch, D. Molnar, H. J. Wang, and L.
Zhuang, "Enabling Security in Cloud Storage SLAs
with CloudProof," in USENIX Annual Technical
Conference (USENIX), 2011.
[4] A. Shraer, C. Cachin, A. Cidon, I. Keidar, Y.
Michalevsky, and D. Shaket, "Venus: verification for
untrusted cloud storage," in CCSW, 2010, pp. 19-30.
Full Text: Access at ACM
[5] H. Abu-Libdeh, L. Princehouse, and H. Weatherspoon,
"Racs: a case for cloud storage diversity," in 1st ACM
Symposium on Cloud Computing, SoCC 2010, 2010,
pp. 229-240. Full Text: Access at ACM
[6] E. Stefanov, M. van Dijk, A. Oprea, and A. Juels, "Iris:
A scalable cloud file system with efficient integrity
checks," in 28th Annual Computer Security
Applications Conference (ACSAC 2012). ACM, 2012.
[CrossRef]
[7] A. N. Bessani, M. P. Correia, B. Quaresma, F. André,
and P. Sousa, "DepSky: Dependable and Secure
Storage in a Cloud-of-Clouds," in EuroSys, 2011, pp.
31-46. [CrossRef]
[8] S. Kamara, C. Papamanthou, and T. Roeder, "CS2: A
Searchable Cryptographic Cloud Storage System,"
Microsoft Research, Tech. Rep. MSR-TR-2011-58,
2011.
[9] J. K. Resch and J. S. Plank, "AONT-RS: Blending
Security and Performance in Dispersed Storage
Systems," in FAST, 2011, pp. 191-202.
[10] J. Spillner, G. Bombach, S. Matthischke, J. Muller, R.
Tzschichholz, and A. Schill, "Information Dispersion
over Redundant Arrays of Optimal Cloud Storage for
Desktop Users," in UCC, 2011, pp. 1-8. Abstract | Full
Text: PDF (482KB) | Full Text: HTML
[11] C. Basescu, C. Cachin, I. Eyal, R. Haas, A. Sorniotti,
M. Vukolic, and I. Zachevsky, "Robust Data Sharing
with Key-Value Stores," in Intl. Conference on
Dependable Systems and Networks (DSN). IEEE,
2012. Abstract | Full Text: PDF (376KB) | Full Text:
HTML
[12] Amazon Outage,
http://www.networkworld.com/news/2012/042712-
amazon- outage-258735.htmll, Nov. 20. 2012.
[13] Sidekick, http://abcnews.go.com/Business/sidekick-
disaster-shows-datas- safe-cloud/story?id=8840420,
Nov. 20. 2012.
[14] A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung,
"Proactive Secret Sharing Or: How to Cope With
Perpetual Leakage," in CRYPTO, 1995, pp. 339-352.
[CrossRef]
[15] A. Shamir, "How to share a secret," Commun. ACM,
vol. 22, no. 11, pp. 612-613, 1979. Full Text: Access at
ACM
[16] P. Feldman, "A Practical Scheme for Non-interactive
Verifiable Secret Sharing," in FOCS, 1987, pp. 427-
437. Abstract | Full Text: PDF (1714KB)
[17] M. O. Rabin, "Efficient dispersal of information for
security, load balancing, and fault tolerance," J. ACM,
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 417
vol. 36, no. 2, pp. 335-348, 1989. Full Text: Access at
ACM
[18] H. Krawczyk, "Secret sharing made short," in
CRYPTO, 1993, pp. 136-146.
[19] P. Rogaway and M. Bellare, "Robust computational
secret sharing and a unified account of classical secret-
sharing goals," in ACM Conference on Computer and
Communications Security, 2007, pp. 172-184.
[20] R. L. Rivest, "All-or-Nothing Encryption and the
Package Transform," in Fast Software Encryption (FSE
'97), 1997, pp. 210-218. [CrossRef]

More Related Content

What's hot

Improving availability and reducing redundancy using deduplication of cloud s...
Improving availability and reducing redundancy using deduplication of cloud s...Improving availability and reducing redundancy using deduplication of cloud s...
Improving availability and reducing redundancy using deduplication of cloud s...dhanarajp
 
Most Downloaded article for an year in academia - International Journal of Ne...
Most Downloaded article for an year in academia - International Journal of Ne...Most Downloaded article for an year in academia - International Journal of Ne...
Most Downloaded article for an year in academia - International Journal of Ne...IJNSA Journal
 
Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...IJNSA Journal
 
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...IJCSIS Research Publications
 
Top 10 Download Article in Computer Science & Information Technology: October...
Top 10 Download Article in Computer Science & Information Technology: October...Top 10 Download Article in Computer Science & Information Technology: October...
Top 10 Download Article in Computer Science & Information Technology: October...AIRCC Publishing Corporation
 
Top cited Network Security Articles- Part 1
Top cited Network Security  Articles- Part 1Top cited Network Security  Articles- Part 1
Top cited Network Security Articles- Part 1IJNSA Journal
 
Gre322me
Gre322meGre322me
Gre322mef95346
 
Toward Cloud Network Infrastructure Approach Service and Security Perspective
Toward Cloud Network Infrastructure Approach Service and Security PerspectiveToward Cloud Network Infrastructure Approach Service and Security Perspective
Toward Cloud Network Infrastructure Approach Service and Security Perspectiveijtsrd
 
A hybrid cloud approach for secure authorized
A hybrid cloud approach for secure authorizedA hybrid cloud approach for secure authorized
A hybrid cloud approach for secure authorizedNinad Samel
 
Iss 15
Iss 15Iss 15
Iss 15ijdms
 
A scalabl e and cost effective framework for privacy preservation over big d...
A  scalabl e and cost effective framework for privacy preservation over big d...A  scalabl e and cost effective framework for privacy preservation over big d...
A scalabl e and cost effective framework for privacy preservation over big d...amna alhabib
 
07 20251 latest trends, challenges ed
07 20251 latest trends, challenges ed07 20251 latest trends, challenges ed
07 20251 latest trends, challenges edIAESIJEECS
 
Cloud Computing in Academic Libraries A Review
Cloud Computing in Academic Libraries A ReviewCloud Computing in Academic Libraries A Review
Cloud Computing in Academic Libraries A Reviewijtsrd
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
IRJET - Cloud Computing and IoT Convergence
IRJET -  	  Cloud Computing and IoT ConvergenceIRJET -  	  Cloud Computing and IoT Convergence
IRJET - Cloud Computing and IoT ConvergenceIRJET Journal
 
Iot and cloud computing on pervasive healthcare
Iot and cloud computing on pervasive healthcareIot and cloud computing on pervasive healthcare
Iot and cloud computing on pervasive healthcareMd Nazrul Islam Roxy
 
IRJET- A Novel Framework for Three Level Isolation in Cloud System based ...
IRJET-  	  A Novel Framework for Three Level Isolation in Cloud System based ...IRJET-  	  A Novel Framework for Three Level Isolation in Cloud System based ...
IRJET- A Novel Framework for Three Level Isolation in Cloud System based ...IRJET Journal
 
Fog Computing: Issues, Challenges and Future Directions
Fog Computing: Issues, Challenges and Future Directions Fog Computing: Issues, Challenges and Future Directions
Fog Computing: Issues, Challenges and Future Directions IJECEIAES
 

What's hot (20)

Improving availability and reducing redundancy using deduplication of cloud s...
Improving availability and reducing redundancy using deduplication of cloud s...Improving availability and reducing redundancy using deduplication of cloud s...
Improving availability and reducing redundancy using deduplication of cloud s...
 
Most Downloaded article for an year in academia - International Journal of Ne...
Most Downloaded article for an year in academia - International Journal of Ne...Most Downloaded article for an year in academia - International Journal of Ne...
Most Downloaded article for an year in academia - International Journal of Ne...
 
Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...
 
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
 
Ijsrp p5211
Ijsrp p5211Ijsrp p5211
Ijsrp p5211
 
Top 10 Download Article in Computer Science & Information Technology: October...
Top 10 Download Article in Computer Science & Information Technology: October...Top 10 Download Article in Computer Science & Information Technology: October...
Top 10 Download Article in Computer Science & Information Technology: October...
 
Top cited Network Security Articles- Part 1
Top cited Network Security  Articles- Part 1Top cited Network Security  Articles- Part 1
Top cited Network Security Articles- Part 1
 
Gre322me
Gre322meGre322me
Gre322me
 
Toward Cloud Network Infrastructure Approach Service and Security Perspective
Toward Cloud Network Infrastructure Approach Service and Security PerspectiveToward Cloud Network Infrastructure Approach Service and Security Perspective
Toward Cloud Network Infrastructure Approach Service and Security Perspective
 
A hybrid cloud approach for secure authorized
A hybrid cloud approach for secure authorizedA hybrid cloud approach for secure authorized
A hybrid cloud approach for secure authorized
 
Iss 15
Iss 15Iss 15
Iss 15
 
A scalabl e and cost effective framework for privacy preservation over big d...
A  scalabl e and cost effective framework for privacy preservation over big d...A  scalabl e and cost effective framework for privacy preservation over big d...
A scalabl e and cost effective framework for privacy preservation over big d...
 
07 20251 latest trends, challenges ed
07 20251 latest trends, challenges ed07 20251 latest trends, challenges ed
07 20251 latest trends, challenges ed
 
Cloud Computing in Academic Libraries A Review
Cloud Computing in Academic Libraries A ReviewCloud Computing in Academic Libraries A Review
Cloud Computing in Academic Libraries A Review
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its Applications
 
Cloud computing kp final
Cloud computing kp finalCloud computing kp final
Cloud computing kp final
 
IRJET - Cloud Computing and IoT Convergence
IRJET -  	  Cloud Computing and IoT ConvergenceIRJET -  	  Cloud Computing and IoT Convergence
IRJET - Cloud Computing and IoT Convergence
 
Iot and cloud computing on pervasive healthcare
Iot and cloud computing on pervasive healthcareIot and cloud computing on pervasive healthcare
Iot and cloud computing on pervasive healthcare
 
IRJET- A Novel Framework for Three Level Isolation in Cloud System based ...
IRJET-  	  A Novel Framework for Three Level Isolation in Cloud System based ...IRJET-  	  A Novel Framework for Three Level Isolation in Cloud System based ...
IRJET- A Novel Framework for Three Level Isolation in Cloud System based ...
 
Fog Computing: Issues, Challenges and Future Directions
Fog Computing: Issues, Challenges and Future Directions Fog Computing: Issues, Challenges and Future Directions
Fog Computing: Issues, Challenges and Future Directions
 

Viewers also liked

Design and development of high frequency resonant transition converter
Design and development of high frequency resonant transition converterDesign and development of high frequency resonant transition converter
Design and development of high frequency resonant transition convertereSAT Publishing House
 
A fusion of soft expert set and matrix models
A fusion of soft expert set and matrix modelsA fusion of soft expert set and matrix models
A fusion of soft expert set and matrix modelseSAT Publishing House
 
Effect of modulus of masonry on initial lateral stiffness of infilled frames ...
Effect of modulus of masonry on initial lateral stiffness of infilled frames ...Effect of modulus of masonry on initial lateral stiffness of infilled frames ...
Effect of modulus of masonry on initial lateral stiffness of infilled frames ...eSAT Publishing House
 
A survey on congestion control mechanisms
A survey on congestion control mechanismsA survey on congestion control mechanisms
A survey on congestion control mechanismseSAT Publishing House
 
Surface morphology of mg f2yf3 multi layer thin films
Surface morphology of mg f2yf3 multi layer thin filmsSurface morphology of mg f2yf3 multi layer thin films
Surface morphology of mg f2yf3 multi layer thin filmseSAT Publishing House
 
Adapting singlet login in distributed systems
Adapting singlet login in distributed systemsAdapting singlet login in distributed systems
Adapting singlet login in distributed systemseSAT Publishing House
 
Extreme software estimation (xsoft estimation)
Extreme software estimation (xsoft estimation)Extreme software estimation (xsoft estimation)
Extreme software estimation (xsoft estimation)eSAT Publishing House
 
Real time reservoir operation (calibration phase) a case study
Real time reservoir operation (calibration phase) a case studyReal time reservoir operation (calibration phase) a case study
Real time reservoir operation (calibration phase) a case studyeSAT Publishing House
 
Heat transfer through journal bearing a case study
Heat transfer through journal bearing a case studyHeat transfer through journal bearing a case study
Heat transfer through journal bearing a case studyeSAT Publishing House
 
Static dictionary for pronunciation modeling
Static dictionary for pronunciation modelingStatic dictionary for pronunciation modeling
Static dictionary for pronunciation modelingeSAT Publishing House
 
Analysis of selection schemes for solving job shop
Analysis of selection schemes for solving job shopAnalysis of selection schemes for solving job shop
Analysis of selection schemes for solving job shopeSAT Publishing House
 
Experimental investigations of diesel engine using fish oil biodiesel and its...
Experimental investigations of diesel engine using fish oil biodiesel and its...Experimental investigations of diesel engine using fish oil biodiesel and its...
Experimental investigations of diesel engine using fish oil biodiesel and its...eSAT Publishing House
 
“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...eSAT Publishing House
 
“Development and performance analysis of a multi evaporating system”
“Development and performance analysis of a multi evaporating system”“Development and performance analysis of a multi evaporating system”
“Development and performance analysis of a multi evaporating system”eSAT Publishing House
 
Performance evaluation of proactive, reactive and
Performance evaluation of proactive, reactive andPerformance evaluation of proactive, reactive and
Performance evaluation of proactive, reactive andeSAT Publishing House
 
Analysis of economic load dispatch using fuzzified pso
Analysis of economic load dispatch using fuzzified psoAnalysis of economic load dispatch using fuzzified pso
Analysis of economic load dispatch using fuzzified psoeSAT Publishing House
 
Behaviour of bituminous concrete modified with polyethylene glycol for blade ...
Behaviour of bituminous concrete modified with polyethylene glycol for blade ...Behaviour of bituminous concrete modified with polyethylene glycol for blade ...
Behaviour of bituminous concrete modified with polyethylene glycol for blade ...eSAT Publishing House
 
Pca based support vector machine technique for volatility forecasting
Pca based support vector machine technique for volatility forecastingPca based support vector machine technique for volatility forecasting
Pca based support vector machine technique for volatility forecastingeSAT Publishing House
 

Viewers also liked (20)

Design and development of high frequency resonant transition converter
Design and development of high frequency resonant transition converterDesign and development of high frequency resonant transition converter
Design and development of high frequency resonant transition converter
 
A fusion of soft expert set and matrix models
A fusion of soft expert set and matrix modelsA fusion of soft expert set and matrix models
A fusion of soft expert set and matrix models
 
Effect of modulus of masonry on initial lateral stiffness of infilled frames ...
Effect of modulus of masonry on initial lateral stiffness of infilled frames ...Effect of modulus of masonry on initial lateral stiffness of infilled frames ...
Effect of modulus of masonry on initial lateral stiffness of infilled frames ...
 
A survey on congestion control mechanisms
A survey on congestion control mechanismsA survey on congestion control mechanisms
A survey on congestion control mechanisms
 
Surface morphology of mg f2yf3 multi layer thin films
Surface morphology of mg f2yf3 multi layer thin filmsSurface morphology of mg f2yf3 multi layer thin films
Surface morphology of mg f2yf3 multi layer thin films
 
Adapting singlet login in distributed systems
Adapting singlet login in distributed systemsAdapting singlet login in distributed systems
Adapting singlet login in distributed systems
 
Extreme software estimation (xsoft estimation)
Extreme software estimation (xsoft estimation)Extreme software estimation (xsoft estimation)
Extreme software estimation (xsoft estimation)
 
Real time reservoir operation (calibration phase) a case study
Real time reservoir operation (calibration phase) a case studyReal time reservoir operation (calibration phase) a case study
Real time reservoir operation (calibration phase) a case study
 
Heat transfer through journal bearing a case study
Heat transfer through journal bearing a case studyHeat transfer through journal bearing a case study
Heat transfer through journal bearing a case study
 
Static dictionary for pronunciation modeling
Static dictionary for pronunciation modelingStatic dictionary for pronunciation modeling
Static dictionary for pronunciation modeling
 
Analysis of selection schemes for solving job shop
Analysis of selection schemes for solving job shopAnalysis of selection schemes for solving job shop
Analysis of selection schemes for solving job shop
 
Experimental investigations of diesel engine using fish oil biodiesel and its...
Experimental investigations of diesel engine using fish oil biodiesel and its...Experimental investigations of diesel engine using fish oil biodiesel and its...
Experimental investigations of diesel engine using fish oil biodiesel and its...
 
“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...
 
I am secure android application
I am secure android applicationI am secure android application
I am secure android application
 
“Development and performance analysis of a multi evaporating system”
“Development and performance analysis of a multi evaporating system”“Development and performance analysis of a multi evaporating system”
“Development and performance analysis of a multi evaporating system”
 
Performance evaluation of proactive, reactive and
Performance evaluation of proactive, reactive andPerformance evaluation of proactive, reactive and
Performance evaluation of proactive, reactive and
 
Pounding problems in urban areas
Pounding problems in urban areasPounding problems in urban areas
Pounding problems in urban areas
 
Analysis of economic load dispatch using fuzzified pso
Analysis of economic load dispatch using fuzzified psoAnalysis of economic load dispatch using fuzzified pso
Analysis of economic load dispatch using fuzzified pso
 
Behaviour of bituminous concrete modified with polyethylene glycol for blade ...
Behaviour of bituminous concrete modified with polyethylene glycol for blade ...Behaviour of bituminous concrete modified with polyethylene glycol for blade ...
Behaviour of bituminous concrete modified with polyethylene glycol for blade ...
 
Pca based support vector machine technique for volatility forecasting
Pca based support vector machine technique for volatility forecastingPca based support vector machine technique for volatility forecasting
Pca based support vector machine technique for volatility forecasting
 

Similar to Cloud Storage Limit Monitoring Measures

Privacy preserving external auditing for data storage security in cloud
Privacy preserving external auditing for data storage security in cloudPrivacy preserving external auditing for data storage security in cloud
Privacy preserving external auditing for data storage security in cloudeSAT Publishing House
 
Ijarcet vol-2-issue-3-951-956
Ijarcet vol-2-issue-3-951-956Ijarcet vol-2-issue-3-951-956
Ijarcet vol-2-issue-3-951-956Editor IJARCET
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudAM Publications
 
Security in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureSecurity in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureeSAT Journals
 
Security in multi cloud data storage with sic
Security in multi cloud data storage with sicSecurity in multi cloud data storage with sic
Security in multi cloud data storage with siceSAT Publishing House
 
An assessment of cloud computing
An assessment of cloud computingAn assessment of cloud computing
An assessment of cloud computingeSAT Journals
 
An assessment of cloud computing evolution
An assessment of cloud computing evolutionAn assessment of cloud computing evolution
An assessment of cloud computing evolutioneSAT Publishing House
 
Ensuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageEnsuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageeSAT Publishing House
 
Ensuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageEnsuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageeSAT Journals
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingEditor IJMTER
 
Issues of cloud security and its implications
Issues of cloud security and its implicationsIssues of cloud security and its implications
Issues of cloud security and its implicationseSAT Publishing House
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSHREYASSRINATH94
 
Distributed Large Dataset Deployment with Improved Load Balancing and Perform...
Distributed Large Dataset Deployment with Improved Load Balancing and Perform...Distributed Large Dataset Deployment with Improved Load Balancing and Perform...
Distributed Large Dataset Deployment with Improved Load Balancing and Perform...IJERA Editor
 
A Survey On Mobile Cloud Computing
A Survey On Mobile Cloud ComputingA Survey On Mobile Cloud Computing
A Survey On Mobile Cloud ComputingJames Heller
 

Similar to Cloud Storage Limit Monitoring Measures (20)

Privacy preserving external auditing for data storage security in cloud
Privacy preserving external auditing for data storage security in cloudPrivacy preserving external auditing for data storage security in cloud
Privacy preserving external auditing for data storage security in cloud
 
Ijarcet vol-2-issue-3-951-956
Ijarcet vol-2-issue-3-951-956Ijarcet vol-2-issue-3-951-956
Ijarcet vol-2-issue-3-951-956
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for Cloud
 
Security in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureSecurity in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architecture
 
Security in multi cloud data storage with sic
Security in multi cloud data storage with sicSecurity in multi cloud data storage with sic
Security in multi cloud data storage with sic
 
An assessment of cloud computing
An assessment of cloud computingAn assessment of cloud computing
An assessment of cloud computing
 
An assessment of cloud computing evolution
An assessment of cloud computing evolutionAn assessment of cloud computing evolution
An assessment of cloud computing evolution
 
Ensuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageEnsuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storage
 
Ensuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageEnsuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storage
 
B042306013
B042306013B042306013
B042306013
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
 
Ms3422732277
Ms3422732277Ms3422732277
Ms3422732277
 
Availability in Cloud Computing
Availability in Cloud ComputingAvailability in Cloud Computing
Availability in Cloud Computing
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computing
 
Issues of cloud security and its implications
Issues of cloud security and its implicationsIssues of cloud security and its implications
Issues of cloud security and its implications
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computing
 
Aj04602248254
Aj04602248254Aj04602248254
Aj04602248254
 
Distributed Large Dataset Deployment with Improved Load Balancing and Perform...
Distributed Large Dataset Deployment with Improved Load Balancing and Perform...Distributed Large Dataset Deployment with Improved Load Balancing and Perform...
Distributed Large Dataset Deployment with Improved Load Balancing and Perform...
 
An4201262267
An4201262267An4201262267
An4201262267
 
A Survey On Mobile Cloud Computing
A Survey On Mobile Cloud ComputingA Survey On Mobile Cloud Computing
A Survey On Mobile Cloud Computing
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 

Recently uploaded (20)

Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 

Cloud Storage Limit Monitoring Measures

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 415 CLOUD STORAGE LIMIT MONITORING MEASURES Jayachandran.R1 1 Department of CSE, saveetha school of Engineering, chennai Abstract We are well aware that cloud storage is becoming very popular and also in wide use nowadays. it is one of the best infrastructure based service. in this paper, we are going to introduce the measures that can be taken to monitor the cloud storages. this is important because, one should be always aware of the storage status of the cloud. so that he can decide what whether he should get some more space in the cloud or to delete the datum from the existing cloud and remain using the same. This measures also use the mobile smart phones to indicate the status of the cloud storage, so that one need not login to the cloud storage every time, when he want to know the status. ----------------------------------------------------------------------***-------------------------------------------------------------------- 1. INTRODUCTION In this technique we are going to use mobile phones and computers to indicate the storage limit and we also use the effective communication between the phones and the computers connected to the internet. 2. SMART PHONE A smartphone, or smart phone, is a mobile phone with more advanced computing capability and connectivity than basic feature phones. Early smartphones typically combined the features of a mobile phone with those of another popular consumer device, such as a personal digital assistant (PDA), a media player, adigital camera. Modern smartphones include all of those features plus the features of a touchscreen computer, including web browsing, Wi-Fi, and 3rd-party apps. Currently, about 90% of handset sales worldwide are for devices 3. CLOUD STORAGE Cloud storage is a model of networked enterprise storage where data is stored in virtualized pools of storage which are generally hosted by third parties. Hosting companies operate large data centers, and people who require their data to be hosted buy or lease storage capacity from them. The data center operators, in the background, virtualize the resources according to the requirements of the customer and expose them as storage pools, which the customers can themselves use to store files or data objects. Physically, the resource may span across multiple servers and multiple locations. The safety of the files depends upon the hosting companies, and on the applications that leverage the cloud storage. Cloud storage services may be accessed through a web service application programming interface (API) or by applications that utilize the API, such as cloud desktop storage, acloud storage gateway or Web-based content management systems. 4. INTERNET The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to link several billion devices worldwide. It is a network of networks that consists of millions of private, public, academic, business, and government networks, of local to global scope, that are linked by a broad array of electronic, wireless, and optical networking technologies. The Internet carries an extensive range of information resources and services, such as the inter-linked hypertextdocuments and applications of the World Wide Web (WWW), the infrastructure to support email, and peer-to-peer networks for file sharing and telephony. 5. PROCESS The process is made very simple here.the process needs the mobile smartphone with the data connection. A computer with the internet connection (that is used by the user) The process starts with synchronizing the mobile with the cloud storage.mobile is programmed in such a way that the mobile monitors the storage space of the cloud continuously.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 416 The mobile phone is connected to computer with internet as well so that the mobile can communicate to computer about the status of the cloud storage. When the cloud storage is full the cloud sends the warning message to the mobile. The mobile that is synchronized with the computers communicates to the computers that the storage is full and they cannot update anymore files. Then the computer starts sending files to the cloud. 6. THE COMPLETE PROCESS The mobile smart phone is connected to the cloud. the smart phone is also connected with the computer with the internet. when the cloud storage is full the cloud sends the warning message that the cloud storage is full. then the mobile sends the error message to the computer. then the computer stops sending the files to the cloud. 7. CONCLUSIONS With the measures introduced in this paper it is very much possible to monitor the cloud storage space and thereby have the idea of the cloud storage limit is filled or not. REFERENCES [1] Z. Wilcox-O'Hearn and B. Warner, "Tahoe: the least- authority filesystem," in StorageSS, 2008, pp. 21-26. Full Text: Access at ACM [2] K. D. Bowers, A. Juels, and A. Oprea, "HAIL: A High- Availability and Integrity Layer for Cloud Storage," in 16th ACM Conference on Computer and Communications Security, CCS '09. ACM, 2009, pp. 187-198. Full Text: Access at ACM [3] R. A. Popa, J. Lorch, D. Molnar, H. J. Wang, and L. Zhuang, "Enabling Security in Cloud Storage SLAs with CloudProof," in USENIX Annual Technical Conference (USENIX), 2011. [4] A. Shraer, C. Cachin, A. Cidon, I. Keidar, Y. Michalevsky, and D. Shaket, "Venus: verification for untrusted cloud storage," in CCSW, 2010, pp. 19-30. Full Text: Access at ACM [5] H. Abu-Libdeh, L. Princehouse, and H. Weatherspoon, "Racs: a case for cloud storage diversity," in 1st ACM Symposium on Cloud Computing, SoCC 2010, 2010, pp. 229-240. Full Text: Access at ACM [6] E. Stefanov, M. van Dijk, A. Oprea, and A. Juels, "Iris: A scalable cloud file system with efficient integrity checks," in 28th Annual Computer Security Applications Conference (ACSAC 2012). ACM, 2012. [CrossRef] [7] A. N. Bessani, M. P. Correia, B. Quaresma, F. André, and P. Sousa, "DepSky: Dependable and Secure Storage in a Cloud-of-Clouds," in EuroSys, 2011, pp. 31-46. [CrossRef] [8] S. Kamara, C. Papamanthou, and T. Roeder, "CS2: A Searchable Cryptographic Cloud Storage System," Microsoft Research, Tech. Rep. MSR-TR-2011-58, 2011. [9] J. K. Resch and J. S. Plank, "AONT-RS: Blending Security and Performance in Dispersed Storage Systems," in FAST, 2011, pp. 191-202. [10] J. Spillner, G. Bombach, S. Matthischke, J. Muller, R. Tzschichholz, and A. Schill, "Information Dispersion over Redundant Arrays of Optimal Cloud Storage for Desktop Users," in UCC, 2011, pp. 1-8. Abstract | Full Text: PDF (482KB) | Full Text: HTML [11] C. Basescu, C. Cachin, I. Eyal, R. Haas, A. Sorniotti, M. Vukolic, and I. Zachevsky, "Robust Data Sharing with Key-Value Stores," in Intl. Conference on Dependable Systems and Networks (DSN). IEEE, 2012. Abstract | Full Text: PDF (376KB) | Full Text: HTML [12] Amazon Outage, http://www.networkworld.com/news/2012/042712- amazon- outage-258735.htmll, Nov. 20. 2012. [13] Sidekick, http://abcnews.go.com/Business/sidekick- disaster-shows-datas- safe-cloud/story?id=8840420, Nov. 20. 2012. [14] A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung, "Proactive Secret Sharing Or: How to Cope With Perpetual Leakage," in CRYPTO, 1995, pp. 339-352. [CrossRef] [15] A. Shamir, "How to share a secret," Commun. ACM, vol. 22, no. 11, pp. 612-613, 1979. Full Text: Access at ACM [16] P. Feldman, "A Practical Scheme for Non-interactive Verifiable Secret Sharing," in FOCS, 1987, pp. 427- 437. Abstract | Full Text: PDF (1714KB) [17] M. O. Rabin, "Efficient dispersal of information for security, load balancing, and fault tolerance," J. ACM,
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 417 vol. 36, no. 2, pp. 335-348, 1989. Full Text: Access at ACM [18] H. Krawczyk, "Secret sharing made short," in CRYPTO, 1993, pp. 136-146. [19] P. Rogaway and M. Bellare, "Robust computational secret sharing and a unified account of classical secret- sharing goals," in ACM Conference on Computer and Communications Security, 2007, pp. 172-184. [20] R. L. Rivest, "All-or-Nothing Encryption and the Package Transform," in Fast Software Encryption (FSE '97), 1997, pp. 210-218. [CrossRef]