Cloud Computing Adoption Approach towards Securing Data in Cloud Computing

Abstract

Present or late investigation on cloud security communicates that the security of customers data has the most astonishing need and furthermore concern. Customers store colossal measures of delicate data on a cloud. Sharing sensitive data will empower attempts to reduce the cost of giving customers redid advantages and offer some motivating force included data organizations. Regardless, secure data sharing is risky. Security is a champion among the most troublesome errand to realize in cloud computing. Assorted sorts of strikes in the application side and in the gear parts. This paper proposes a framework for secure delicate data sharing in cloud, including secure information development, aggregating, use, and obliteration on a semi-confided in cloud condition. We trust this must be able to accomplish with an approach that is think, adoptable and all around formed. This paper elucidates the audit, strategy for thinking and parts in the Cloud Computing Adoption Framework (CCAF) to guarantee data security. CCAF is appeared by the system design in perspective of the necessities and the execution showed by the CCAF multi-layered security. We propose an answer in light of developing needs to upgrade current Cloud security, Fine Grained Security Model (FGSM) which is planned to facilitate three particular sorts of security systems and offer multi-layered security for a prevalent data affirmation. Since our Server cultivate has 10peta bytes of data, there is a colossal errand to give nonstop protection and seclude. In this paper discussed the secure hash algorithm (SHA) made by the National Security Agency (NSA) as SHA-0 and later offered over to the National institute of Standards and technology (NIST). SHA is a hash work that takes a variable length input message and makes a settled length yield message called the hash or the message procedure of the principal message. The paper in like manner conveys the delayed consequences of execution of the SHA algorithm. The SHA algorithm is of particular centrality because of its usage with the Digital Signature Algorithm (DSA) for advanced marks. We utilize Business Process Modeling Notation (BPMN) to reproduce how information is being used. The utilization of BPMN re-approval or entertainment engages us to review the picked security appears before true blue execution. P. Anjaneyulu | Mr. S. Srinivasa Reddy"Cloud Computing Adoption Approach towards Securing Data in Cloud Computing" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-4 , June 2018, URL: http://www.ijtsrd.com/papers/ijtsrd12995.pdf http://www.ijtsrd.com/computer-science/other/12995/cloud-computing-adoption-approach-towards-securing-data-in-cloud-computing/p-anjaneyulu

Authors and Affiliations

Keywords

Related Articles

Study of Intermolecular Interactions through Freelength, and Internal Pressure of Ternary Liquid Mixture of Alcohol, Formic Acid and Tri-Ethyl Amines

Ultrasonic velocities, Densities and Viscosities are measured for ternary liquid mixture of formic acid and tri-ethylamine (TEA) with ethanol. From this experimental data freelength, excess freelength, internal pressure...

A Phenomenological Research to Assess the View Point of Undergraduates Regarding the Consumption of Favorite Snacks during University Examination

The present study has been conducted to know the view point of participant regarding the consumption of favorable snacks to reduce the stress level during examination in LN Nursing College Bhopal. In order to achieve the...

Coceptual Study of Kaseesa Bhasma and Abhijita Taila Nasya in the Management of Timira W.S.R Simple Myopia

Eye is the organ for visual sensation, if vision is lost merely everything is lost. A blind man, though rich cannot enjoy the world, so it is explained that “Sarvendiiyaanaam nayanapradaaam.” Timira1 is the root cause fo...

An Alternative Fuel for Future Bio Fuel

Biofuels are gaining increased public and scientific attention, driven by factors such as oil price spikes, the need for increased energy security and concern over greenhouse gas emissions from fossil fuels. Most cars an...

A Survey on Garbage Monitoring System using Internet of Things

The IoT Garbage Monitoring system is one of the innovative systems which will provides a healthy surroundings in the cities. The ultrasonic sensor is used for measuring the length of the bins, once the bins are being dum...

Download PDF file
  • EP ID EP361123
  • DOI -
  • Views 73
  • Downloads 0

How To Cite

(2018). Cloud Computing Adoption Approach towards Securing Data in Cloud Computing. International Journal of Trend in Scientific Research and Development, 2(4), -. https://europub.co.uk./articles/-A-361123