Submit Search
Upload
IRJET- Efficient and Secure Data Storage in Cloud Computing
•
0 likes
•
31 views
IRJET Journal
Follow
https://www.irjet.net/archives/V6/i5/IRJET-V6I5593.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 7
Download now
Download to read offline
Recommended
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET Journal
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET Journal
Web Services as A Solution for Cloud Enterprise Resource Planning Interoperab...
Web Services as A Solution for Cloud Enterprise Resource Planning Interoperab...
AIRCC Publishing Corporation
Transforming the Data into Virtual Set Up Segmented usage and Adoption
Transforming the Data into Virtual Set Up Segmented usage and Adoption
ijtsrd
Cloud Computing in Chemical Industry
Cloud Computing in Chemical Industry
journal ijrtem
Security & privacy issues of cloud & grid computing networks
Security & privacy issues of cloud & grid computing networks
ijcsa
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET Journal
Addressing the cloud computing security menace
Addressing the cloud computing security menace
eSAT Publishing House
Recommended
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET Journal
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET Journal
Web Services as A Solution for Cloud Enterprise Resource Planning Interoperab...
Web Services as A Solution for Cloud Enterprise Resource Planning Interoperab...
AIRCC Publishing Corporation
Transforming the Data into Virtual Set Up Segmented usage and Adoption
Transforming the Data into Virtual Set Up Segmented usage and Adoption
ijtsrd
Cloud Computing in Chemical Industry
Cloud Computing in Chemical Industry
journal ijrtem
Security & privacy issues of cloud & grid computing networks
Security & privacy issues of cloud & grid computing networks
ijcsa
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET Journal
Addressing the cloud computing security menace
Addressing the cloud computing security menace
eSAT Publishing House
Idc unified-infrastructure
Idc unified-infrastructure
CMR WORLD TECH
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
IJMER
Cloud Computing- future framework for e- management of NGO's
Cloud Computing- future framework for e- management of NGO's
The Kalgidar Society - Baru Sahib
SECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTING
International Journal of Technical Research & Application
The Roles and Challenges of Cloud Computing to Accounting System of Vietnames...
The Roles and Challenges of Cloud Computing to Accounting System of Vietnames...
International Journal of Economics and Financial Research
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
ijtsrd
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET Journal
Implementing Iris in the Railway Control Office Application for Secure Saas i...
Implementing Iris in the Railway Control Office Application for Secure Saas i...
IJERA Editor
Data Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHA
IRJET Journal
Vendor classification & rating
Vendor classification & rating
Amit Puri
The Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud Computtiing
IJERA Editor
Addressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud Computing
Editor IJCATR
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
CSCJournals
70 74
70 74
Editor IJARCET
A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...
A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...
Eswar Publications
IRJET- Effective Privacy based Distributed Storage Structure
IRJET- Effective Privacy based Distributed Storage Structure
IRJET Journal
Mobile cloud computing implications and challenges
Mobile cloud computing implications and challenges
Alexander Decker
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET Journal
IRJET- Cloud Computing: Security Issues Challenges and Solution
IRJET- Cloud Computing: Security Issues Challenges and Solution
IRJET Journal
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET Journal
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
IRJET Journal
IRJET- Cloud Computing Review
IRJET- Cloud Computing Review
IRJET Journal
More Related Content
What's hot
Idc unified-infrastructure
Idc unified-infrastructure
CMR WORLD TECH
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
IJMER
Cloud Computing- future framework for e- management of NGO's
Cloud Computing- future framework for e- management of NGO's
The Kalgidar Society - Baru Sahib
SECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTING
International Journal of Technical Research & Application
The Roles and Challenges of Cloud Computing to Accounting System of Vietnames...
The Roles and Challenges of Cloud Computing to Accounting System of Vietnames...
International Journal of Economics and Financial Research
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
ijtsrd
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET Journal
Implementing Iris in the Railway Control Office Application for Secure Saas i...
Implementing Iris in the Railway Control Office Application for Secure Saas i...
IJERA Editor
Data Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHA
IRJET Journal
Vendor classification & rating
Vendor classification & rating
Amit Puri
The Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud Computtiing
IJERA Editor
Addressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud Computing
Editor IJCATR
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
CSCJournals
70 74
70 74
Editor IJARCET
A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...
A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...
Eswar Publications
IRJET- Effective Privacy based Distributed Storage Structure
IRJET- Effective Privacy based Distributed Storage Structure
IRJET Journal
Mobile cloud computing implications and challenges
Mobile cloud computing implications and challenges
Alexander Decker
What's hot
(17)
Idc unified-infrastructure
Idc unified-infrastructure
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
Cloud Computing- future framework for e- management of NGO's
Cloud Computing- future framework for e- management of NGO's
SECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTING
The Roles and Challenges of Cloud Computing to Accounting System of Vietnames...
The Roles and Challenges of Cloud Computing to Accounting System of Vietnames...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
Implementing Iris in the Railway Control Office Application for Secure Saas i...
Implementing Iris in the Railway Control Office Application for Secure Saas i...
Data Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHA
Vendor classification & rating
Vendor classification & rating
The Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud Computtiing
Addressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud Computing
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
70 74
70 74
A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...
A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...
IRJET- Effective Privacy based Distributed Storage Structure
IRJET- Effective Privacy based Distributed Storage Structure
Mobile cloud computing implications and challenges
Mobile cloud computing implications and challenges
Similar to IRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET Journal
IRJET- Cloud Computing: Security Issues Challenges and Solution
IRJET- Cloud Computing: Security Issues Challenges and Solution
IRJET Journal
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET Journal
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
IRJET Journal
IRJET- Cloud Computing Review
IRJET- Cloud Computing Review
IRJET Journal
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET Journal
IRJET- An Overview on Cloud Computing and Challenges
IRJET- An Overview on Cloud Computing and Challenges
IRJET Journal
IRJET- Enhancing Information Leakage in Multi Cloud Storage Facilities
IRJET- Enhancing Information Leakage in Multi Cloud Storage Facilities
IRJET Journal
The Impact of Cloud Computing in the field of Finance: A Comprehensive Analysis
The Impact of Cloud Computing in the field of Finance: A Comprehensive Analysis
IRJET Journal
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET Journal
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
IRJET Journal
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET Journal
Salesforce.com – A Cloud Provider
Salesforce.com – A Cloud Provider
IRJET Journal
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...
IRJET Journal
Paper id 212014104
Paper id 212014104
IJRAT
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET Journal
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET Journal
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
IRJET Journal
An Analysis of Cloud Security
An Analysis of Cloud Security
IRJET Journal
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
IOSR Journals
Similar to IRJET- Efficient and Secure Data Storage in Cloud Computing
(20)
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- Cloud Computing: Security Issues Challenges and Solution
IRJET- Cloud Computing: Security Issues Challenges and Solution
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
IRJET- Cloud Computing Review
IRJET- Cloud Computing Review
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- An Overview on Cloud Computing and Challenges
IRJET- An Overview on Cloud Computing and Challenges
IRJET- Enhancing Information Leakage in Multi Cloud Storage Facilities
IRJET- Enhancing Information Leakage in Multi Cloud Storage Facilities
The Impact of Cloud Computing in the field of Finance: A Comprehensive Analysis
The Impact of Cloud Computing in the field of Finance: A Comprehensive Analysis
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
Salesforce.com – A Cloud Provider
Salesforce.com – A Cloud Provider
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...
Paper id 212014104
Paper id 212014104
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
An Analysis of Cloud Security
An Analysis of Cloud Security
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
DeepakSakkari2
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Tsuyoshi Horigome
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
eptoze12
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
abhishek36461
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Suhani Kapoor
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
959SahilShah
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
misbanausheenparvam
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
ssuser7cb4ff
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
DeelipZope
Internship report on mechanical engineering
Internship report on mechanical engineering
malavadedarshan25
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
rehmti665
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Asst.prof M.Gokilavani
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
Recently uploaded
(20)
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
Internship report on mechanical engineering
Internship report on mechanical engineering
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
IRJET- Efficient and Secure Data Storage in Cloud Computing
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4862 Efficient and Secure Data Storage in Cloud Computing Manish M Saunshi1, Manoj N2, M Ramesh3, Nithyashree B.T4, Vaidehi M5 1,2,3,48th Semester Students, Department of Information Science and Engineering, Dayananda Sagar College of Engineering, Bangalore, Karnataka, India 2Asst.Professor, Department of Information Science and Engineering, Dayananda Sagar College of Engineering, Bangalore, Karnataka, India. ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Cloud computingisthewayofprovidingcomputing resources in the form of services over internet. The cloud computing allows storing the user’s data and to measure the applications and services provided by cloud server. Thereis an ample data stored at cloud storage server. Security is one of the major issues which reduce the growth of cloud computing so Cloud computing entails encyclopedic security solutions. This is presented on secure file exchanging on Cloud using SHA-256 algorithm which is capable of solving data security, authentication, and integrity problems of files on the cloud. Data security is improved by cryptography algorithms. The rightness of data is verified by introducing techniques. In our proposed system we integrate symmetric and asymmetric algorithms. Results show improved security and less storage space. Key Words: Cloud Computing, Privacy, Security, Encryption, Storage 1. INTRODUCTION Cloud computing isthemost demandedtechnologiesused all over the world. It provides all kinds of services to the user. One of the most prominent service offered by cloud computing is cloud storage. Cloud storage is simply a term that refers to online space that you can use to store your data. It refers to delivering services over the internet or based on cloud infrastructure. The cloud computing will bring several advantages to the market and the three most important are: cost effectiveness, security and scalability. Cloud storage is a service model in which data ismaintained, managed and backed up remotely and made available to users over a network. The biggest concern about cloud storage is cloud security. Security is considered as a key requirement for cloud computing consolidation as a robust and a feasible multipurpose solution. Recently, most of the organizations are analyzing the cloud technology in term of cost saving tool used regardless of the level of the security provided by the Cloud Service Provider (CSP), but it is difficult to measure the benefitsintermof one category, as discussed by Richard Mayo and Charles Perng in[2] where the saving represent based on the cloud computing Rate of Interest (RoI) a research conducted by IBM group. The RoI can be based on five categories as in Table1. Table 1: Cost saving in cloud Hardware Number of servers required will be reduced. Reduce cost of floor space required. Reduction in the power consumption. Negligible cost. Software Number of OS Cost required to be purchased per client will be reduced. Supporting and maintenance cost for different implemented software will be reduced. purchasing the virtualization software. Cost of the cloud services management Software. Automated Provisioning Reduction in number of hours required to provision each task. Cost required for training staff to work on automated provisioning systems. Cost of deployment. Maintenance Cost. Productivity Having user friendly support service which will reduce Time required from staffto Wait for IT support. Negligible cost. System Enhance Negligible cost.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4863 One Year Saving Testing Hardware Prod. 15% 4% Sys. Software Admin. 3% 40% Provisioning 38% administration productivity of administratio n and support staff where there are more systems to support per administrator. In Figure 1, shows the result of a case study such as a bank where it requires a huge number of servers to manage their business which results in turning their business into cloud. Figure 1. Statics showing savings through cloud services In the near future, spending on cloud computing will grow rapidly as. “The US government projects between 2019 and 2025 will increase spending on cloud computing by 40% compound annual rate to reach $7 million by 2025”. Cost effectiveness is one of the major motivations to use cloud computing. However, we should consider other challenges such as security. Organizations will upload its databases, user related information and in some cases the entire infrastructure will be hosted in the cloud. 2. CLOUD COMPUTING STRUCTURE A. Types of Cloud Systems There are main three systems categories: Software as a Service, Platform as a Service and Infrastructure as a Service. Let’s look at them in more details as follows: 1) Software as a Services(SaaS): Traditionally, users prescribe software and itislicense in order to install it on their hard disk and then use it, however, in the cloud users do not required to purchase the software rather the payment will be based on pay-per- use model. It support multi-tenant which means that the physical backend infrastructure is shared among several users which are unique for each user. 2) Platform as a Service(PaaS): In PaaS the development environment provided as service. The developers will use vendor’s block of code to create their own applications. The platform will be hosted in the cloud and will be accessed using the browser. 3) Infrastructue as a Service (IaaS): In IaaS, vendors providethe infrastructureas a service where it is delivered in form of technology, datacenters and IT services to the customer which is equivalent to the traditional “outsourcing” in the business world but with much less expenses and effort. The main purpose is to tailor a solution to the customer based on required applications. Table 2 shows cloud computing servicesthat are currently utilized by several providers. Table 2: Cloud Computing Services Services Providers SaaS Support running multiple instances of it. Develop software that is capable to run in the cloud. Google Docs Mobile Me Zoho PaaS Platform which allows developer to create programs that can be run in the cloud. Includes several applications services which allow easy deployment. Microsoft Azure Force.com Google App Engine. IaaS Highly scaled and shared computing infrastructure accessible using internet browser. Consists of Database, servers and storage AmazonS3 Sun’s Cloud Service Security Management (SM)includes functions that control and protect access to organization’s resources, information, data, and IT services in order to ensure confidentiality, integrity, and availability. Security management functions are methods for authentication, authorization, encryption, etc. Unfortunately, the expanded definitions and standards around security management do not define a common set of security management areas. Within the context of Cloud Computing, one of the most important security challenges is to manage and assure a secure usage over multi-provider Inter-Cloudenvironments with dedicated communication infrastructures, security mechanisms, processes and policies. The aim of Security controls in Cloud computing is, for the most part, no
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4864 different than security controlsinanyITenvironmentfroma functional security management perspective. The adaption and reuse of existing traditional security managementareas that have to be enhanced for specific Cloud computing requirements (e.g., dynamic reconfiguration, distributed services, etc.) has been proposed. Table 3: Examples of cloud providers Provider Applicati on Usage Description Amazon ( IaaS) Elastic Comput e Cloud (EC2) Simple Storage Service (S3) Web application hosting Backup and storage High performance computing Web service provides scalable compute capacity in the cloud [7]. Allows application deploymen t on the web services interface. Web services interface which is used for storageand retrieving data. Google (SaaS, PaaS) Gmail Google Email Security Google Docs Messaging Securing existing email systems Collaboration Using email services without managing and maintaining message architecture. Filtering spam and viruses. Provide collaboratio n tools without installing software on the machines or servers. Microsoft Azure (PaaS) Window s .NET services SQL Services Offering application to organization as SaaS Application Development Organization uses Azure Platform to enhance the functionality of existing application without investing in internal infrastructur e. Use Azure platform to develop custom application 3. CLOUD SECURITY AND PRIVACY In cloud computing, end users’ data stored in the service provider’s data centers rather than storing it on user’s computer. This will make users concerned about their privacy. Moreover, moving to centralized cloud services will result in user’s privacy and security breaches. Security threats may occur during the deployment; also new threats are likely to come into view. Cloud environment should preserve data integrity and user privacy along with enhancing the interoperability across multiple cloud service providers. Thus, we would like to discuss data integrity, confidentiality and availability in the cloud. The security related to data distributed on three levels: Network Level: The Cloud Service Provider (CSP) will monitor, maintain and collect information about the firewalls, Intrusion detection or/and prevention systems and data flow within the network. Host Level: It is veryimportanttocollectinformationabout system log files. In order to know where and when applications have been logged. Application Level: Auditing application logs, which then can be required forincident response or digital forensics. At each level, it is required to satisfy security requirements to preserve data security in the cloud such as confidentiality, integrity and availability as follows: A. Confidentiality Ensuring that user data which resides in the cloud cannot be accessed by unauthorized party. This can be achievedthroughproperencryptiontechniquestakinginto consideration the type of encryption: symmetric or asymmetricencryptionalgorithms,alsokeylengthandkey
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4865 management in case of the symmetric cipher.Actually,itis all based on the CSP. For instance, Mozy Enterprise uses encryption techniques to protect customer data whereas Amazon S3 does not. It also depends on the customer awareness where they can encrypt their informationprior to uploading it. Also, The CSP should ensure proper deployment of encryption standardsusingNISTstandards in. B. Integrity: Cloud users should not only worry about the confidentiality of data storedin the cloud but also the data integrity. Data could be encrypted to provide confidentiality where it will not guarantee that the data has not been altered while it is reside in the cloud. Mainly, there are two approaches which provide integrity, using Message Authentication Code (MAC) and DigitalSignature (DS). In MAC, it is based on symmetric key to provide a check sum that will be append to the data. On the other hand, in the DS algorithm it depends on the public key structure (Having public and private pair of keys). As symmetric algorithms are much faster than asymmetric algorithms, in this case, we believe that Message Authentication Code (MAC) will be the best solution to provide the integrity checking mechanism. Studies show that, PaaS and SaaS doesn’t provide any integrity protection, in this case assuring the integrity of data isessential. C. Availability: Another issue is availability of the data when it is requested via authorizedusers.Themostpowerfultechnique is prevention through avoiding threats affecting the availability of the service or data. It is very difficult to detect threats targeting the availability. Threats targeting availability can be either Network based attacks such as Distributed Denial of Service (DDoS) attacks or CSP availability. For example, Amazon S3 sufferedfromtwoanda half hours outage in February 2008 andeighthoursoutagein July2008. 4. PROBLEM STATEMENT Since the cloud is a multi tenancy model, Data securityis one of the prime issue. In this paper we enhance the cloud performance by implementing appropriate data security techniques. Although cryptographic approachescanachieve the security goals for the cloud system, it might significantly reduce the efficiency of the cloud system and hence makes deployment of traditional data utilization service difficult. For example, the traditional encryption of data in the cloud makes inefficient to exploit the data redundancy when the server performs deduplication to save storage space. Moreover, the encrypted data cannot be searched in the traditional way due to the protection of the data privacy and hence results in additional costs for the user and the server. Therefore, it is desirable to build cryptographic approaches to achieve the security goals without introducing significant overhead for the cloud system. In this project, we mainly focus on efficient and secure data storage and retrieval in cloud computing A. Challenges: The main challenge for any organization in managing the identities resulted fromthevariety of the user population that an organization consists- customers, employers, partners, etc. Managing and maintaining staff turnover within the organization where it varies based on the current trend of the business in the market and itsfunction. Handling user’s identities in the case of merges and demerges. Avoid the duplication of identities, attributesand credentials. The above mentioned challenges and more, direct companies to look for centralized and automated identity management systems. It is an arrangement made between groups of enterprises (this relationshipbasedonthetrust)so that userscan use the sameidentificationattributestoobtain services from the trusted group. The core responsibility is to manage the access control for services beyond the organizations internal network. Thus, we would like to discuss the current practice of identityand access management (IAM)whichisconsidereda great help in providing Authentication, Authorization and Auditing for users who are accessing the cloud computing as follows: 1) Authentication: Cloud computing authentication involves verifying the identity of users or systems. For instance, service to service authentication involves in verifying the access request to the information which served by another service. 2) Authorization: Once the authentication process succeeds, then the process of determining the privileges could be given to legitimateusers. Inthisstage,thesystemwillenforcethe security policies. 3) Auditing: It is the process of reviewing and examining the authorization and authentication records in order to check, whether compliances with predefined security standards and policies. Also, it will aid in detecting any system breaches. 5. PROPOSED SYSTEM The proposed design allows the user to audit the cloud storage efficiently and in a more secured manner by
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4866 encrypting the data and later uploading it. The proposed design further supports secure and efficient dynamic operations on outsourced data including managed control such as, > Deletion > Append > Security Figure 2.Cloud Data Storage Architecture The three network entities viz. the client, cloud server and TPA are present in the cloud environment. The client stores data on the storage server provided by the cloud service provider (CSP). TPA keeps a check on client’s data by periodically verifying integrity of data on-demand and notifiesclient if any variationor fault is foundinclient’s data. Figure 2 shows the cloud data storage architecture 6. ARCHITECTURE Figure 3. Architecture At its most basic, cloud architecture can be classified into two sections: front-end and back-end, connected to each other via a virtual network or the internet. Cloud Computing architecture refers to the various components and sub-componentsofcloudthatconstitutethe structure of the system. A front-end platform that can include fat clients, thin clients, and mobile devices Back-end platforms, such as servers and storage A network (internet, intranet) Front-end is the sidethat is visible to the client,customer, or user. Front-end pieces include the user interface, and the client’s computer system or network that is used for accessing the cloud system. You have probably noticed that different cloud computing systems use different user interfaces—for example, not only can you choose from a variety of web browsers (including Chrome, Safari, Firefox, etc.), but the Google Docs user interface is different than that of Sales force. On the other hand, the back-end pieces are on the side used by the service provider. These include various servers, computers, data storage systems, virtual machines, and programs that together constitute the cloud of computing services. The back- end side also is responsible for providing security mechanisms, traffic control and protocols that connect networkedcomputers forcommunication.Tobriefly summarize: the front-end is the part you see, and the back- end is the computing that happens behind the scenes. Cloud services can be delivered publicly or privately using the internet and can also remain within a company’s network when delivered over an intranet. Sometimes, organizations make use of a combination of both. No matter where the actual “cloud” is—a company’s own data center or a service provider’s data center, cloud computing uses networking to enable convenient, on-demand access to a shared pool of computingresourceslikenetworks,storage,servers,services, and applications. By using virtualization, these assets can be provisioned and released quickly and easily as necessary. An online network storage where data is stored and accessible to multiple clients. Cloud storage is generally deployed in the following configurations: public cloud, privatecloud, community cloud, or somecombination of the three also known as hybrid cloud.
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4867 7. DATA FLOW DIAGRAM Methodology: In the proposed method, to ensure security the SHA-256 algorithm has been applied. SHA-256 Algorithm: This algorithm handles256 bits known as digest length. This algorithm does not use any keys. SHA-256 or Secure Hash algorithm is commonly usedindatasecurityforvarious applications. The hash function which is a mathematical model, converts the actual data into encrypted form. If the input data changes the output hash also changes. Sample Results: Figure 5 Image for encryption 8. CONCLUSION: Cloud computing is the long dreamed vision of computingas a utility, where users can remotely store their data into the cloud so as to enjoy the on-demand high qualityapplications and services from a shared pool ofconfigurablecomputingre sources. By data outsourcing, users can be relieved from the burden of local data storage and maintenance. However, the fact that users no longer have physical possession of the possibly large size of outsourced data makes the data integrity protection in Cloud Computing a very challenging and potentially formidable task, especially for users with constrained computing resources and capabilities. Thus, enabling public audit abilityforclouddata storagesecurityis of critical importance so that users can resort to an external audit party to check the integrity of outsourced data when needed. Data sharing in cloud computing enables multiple participants to freely share the group data, which improves the efficiency of work in cooperative environments and has widespread potential applications. However, how to ensure the security of data sharing within a group and how to efficiently share the outsourced data in a group manner are formidable challenges. 9. REFERENCES 1. Maithilee Joshi, Karuna P. Joshi and Tim Finin-“Attribute Based Encryption for Secure Access to Cloud Based EHR Systems” 2018 IEEE 11th International ConferenceonCloud Computing 2. Sukhpal Singh, Gill and RajkumarBuyya -“Failure Management for Reliable Cloud Computing: A Taxonomy, Model and Future Directions “IEEE Cloud Computing5, no.1 (2018): 60-72.
7.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4868 3. Nelson Gonzalez-” A quantitative analysis of current security concernsandsolutionsforcloudcomputing”Journal of Cloud Computing: Advances, Systems and Applications 2012. 4. SameeraAbdulrahmanAlmulla-“CloudComputingSecurity Management” , ISBN: 978-0-4596-802769, 2009 5. Michael Kretzschmar- “Cloud Computing Security Management Areas in the Inter Cloud”, 2011 IEEE 4th International Conference on Cloud Computing. 6. V. Yamuna, AnushaPriya, ”Efficient and Secure Data Storage in Cloud Computing RSA and DSE function”, vol. 25, no. 6, June 2009, pp 599–616. 7. P.Geetha, “A Comparative-Study of Load-Cloud Balancing Algorithms in Cloud Environments”, International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS-2017) 8. V. Guzhov, K. Bazhenov, S. Ilinykh, A. Vagizov: "Cloud computing security issues", The 2-nd Indo-Russian Joint Workshop on Computational Intelligence and Modern Heuristics in Automation and Robotics,pp. 128-133, 2011. 9. Partha Dutta, Tridib Mukherjee, Vinay G. Hegde and SujitGujar†: 2014 IEEE International Conference on “Cloud Computing-C-Cloud: A Cost-Efficient Reliable Cloud of Surplus Computing Resources” 10. Cong Wang, Qian Wang, and Kui: “Preserving Public Auditing for Data Storage SecurityinCloudComputing”IEEE INFOCOM 2010. 11. T. Mather, S. Kumarasuwamy and S.Latif,“CloudSecurity andPrivacy”, O’Rielly, ISBN: 978-0-4596-802769, 2009. 12. J. W. Rittinghouse,J. F. Ransome, “Cloud Computing: Implementation,ManagementandSecurity”CRCPress,ISBN: 978-1-4398-0680-7,2009. 13. Paul McDougall, “The Four Trends Driving Enterprise CloudComputing”,http://www.informationweek.com/cloudc omputing/blog/archives/2008/06/the-four-trends.html,10 June 2008, retrieved 26 Feb 2009 14. M. Dikaiakos, G. Pallis, D. Katsaros, P. Mehra and A. Vakali, “CloudComputing: Distributed Internet Computing for IT and ScientificResearch”, IEEE Internet Conputing, vol. 13, no. 5, 2009. 15.“Architectural Strategies for Cloud Computing”, Oracle Corporation,August 2009. 16. H. Cademartori, “Green Computing Beyond the Data Center”, ©TechTarget, 2007. 17. L. M. Kaufman, “Data Security in the World of Cloud Computing”,IEEE Security & Privacy, vol. 7, no. 4, 2009. BIOGRAPHIES: 1. Author 1: Manish M Saunshi Description: 8th semester student, Department of Information Science and Engineering, Dayananda Sagar College of Engineering, Bangalore, Karnataka, India. 2. Author 2: Manoj N Description: 8th semester student, Department of Information Science and Engineering, Dayananda Sagar College of Engineering, Bangalore, Karnataka, India. 3. Author 3: M.Ramesh Description: 8th semester student, Department of Information Science and Engineering, Dayananda Sagar College of Engineering, Bangalore, Karnataka, India. 4. Author 4: Nithyashree B T Description: 8th semester student, Department ofInformation Science and Engineering, Dayananda Sagar College of Engineering, Bangalore, Karnataka, India. 5. Author 5: Vaidehi M Description: Asst.Professor,Department of Information Science and Engineering, Dayananda Sagar College of Engineering, Bangalore, Karnataka, India. 1’st Author Photo 2nd Au thor Photo 3rd Author Photo 4th Author Photo
Download now