Secured Architecture To Access Cloud Based Services

Abstract

Cloud computing is new software IT revolution refers to the delivery of computer resources over the internet. Cloud storage is about much more than hosting online media. You need to deliver online media content, such as streaming video, fast enough for your web viewing audience. But sometimes user determine the selection cloud services may have loss of confidentiality and data emission this paper aims to provide maximal safeness and confidentiality to the data placed on the cloud by using two way validation process and Tresorit-The ultimate way to stay safe in the cloud with the use of factors to the internet browsers. The main advantage of this application is to provide maximum security and maintenance free service. The uniqueness of this process is to keep the data on different clouds which produces a thereat free application to end user.

Authors and Affiliations

Ch V. V Ganeswara Rao, Chokkapu Narayanarao

Keywords

Related Articles

Data Stream Mining using Reinforcement Learning: A Survey

Large numbers of real world applications are producing continuous and large data streams for further analysis. Data stream mining is allowing users to extracts knowledge in the form of patterns or model from the cont...

Data Accelerating In Wireless Sensor Networks Without Prune Delay

In this advance and fast world people do no want to wait much for collecting information.Hence now a days collecting information in a faster way became a challenge for the research. Faster data collection in WSN with...

Efficient Techniques For load balancing and dynamic resource management in cloud

Cloud computing applications are developed using MapReduce programming. Cloud computing distributed file system nodes perform functionality like computing as well as storage in this a file is partitioned into a numbe...

A Reliable Image Steganography with Image Clustering and Robust Steganography using IWT

Steganography is the science that includes imparting mystery information in a suitable sight and multimedia bearer, e.g., picture, sound, and video records. In this paper, we propose a changed secure steganography pla...

Secret Sharing of Convergent Keys to Third Party Concept of Dekey

Data de-duplication is a method for eliminating redundant data copies and has been widely used in cloud storage provider to reduce the storage space and bandwidth. The arising challenge is to perform secure de-duplic...

Download PDF file
  • EP ID EP28129
  • DOI -
  • Views 270
  • Downloads 1

How To Cite

Ch V. V Ganeswara Rao, Chokkapu Narayanarao (2014). Secured Architecture To Access Cloud Based Services. International Journal of Research in Computer and Communication Technology, 3(12), -. https://europub.co.uk./articles/-A-28129