An Implementation for Conserving Privacy based on Encryption Process to Secured Cloud Computing Environment
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 2
Abstract
This paper describes a study on the existing methods, techniques and proposed implementation approach for cloud computing. Cloud computing is a style of computing in which dynamically scalable and often virtualized resources are provided ‘As a service’ over the Internet. It provides on demand and at scale services for network infrastructure, platforms, and applications based on an off premise, pay-as-you-go operational model. Files and other data can be stored in the cloud and be accessed from any Internet connection. But some security or privacy issues should be taken into account while using this services such as private information disclosure problem while data being shared within the cloud, unauthorized access to personal data, Unauthorized secondary storage, Uncontrolled data propagation etc. Various service providers apply different methods to solve privacy problems but it is not sufficient. In this paper, a survey on the security policies, trust & privacy issues are studied & based on that the proposed system created & implemented. It is very important in today’s world to provide trusted service for cloud data storage, so that the users trust an encryption approach that is implemented in the proposed work. It checks the integrity & consistency of stored data on the cloud. So, the proposed implemented approach can be used by cloud service providers in order to get a secured cloud computing environment.
Authors and Affiliations
Paresh D. Sharma
Image Compression Using Fast Wavelet Transform
In general, image compression reduces the number bits required to represent an image. The main significance of image compression is that the quality of the image is preserved. This in turn increases the storage sp...
STUDY OF EXEMPLAR BASED IMAGE INPAINTING TECHNIQUES
Image Inpainting refers to filling up the missing area (hole) of an image by using the information from surrounding’s (known area) such that the resultant image is logically accepted. OR it is a technique of altering t...
DESIGN MODELING AND ANALYSIS OF TWO STAGE ROTARY KILN
Submerged arc welding(SAW) is common arc welding process.The welding head moves from right to left.The flux powder is supplied by the hopper. Flux grains are made from dry chemical powder mixed with chemical binde...
FPGA Implementation of Solid Waste Bin Monitoring and Collection system
solid waste management is anunavoidableissue in city areas for almost all the countries in the world. To maintain a safe and green environment for people, it is necessary to adopt an effective waste management sys...
Environmental Assessment of Gorakhpur Industrial Developmental Authority (GIDA) Project Area
In the present study, Environmental Assessment of Gorakhpur Industrial Developmental Authority (GIDA) Project Area is carried out with a view to look into the present status of environmental quality and issues rel...