Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Kirubakaramoorthi, R.
- Survey on Encryption Techniques used to Secure Cloud Storage System
Abstract Views :173 |
PDF Views:0
Authors
Affiliations
1 AMET University, Kanathur, Chennai - 603112, Tamil Nadu, IN
1 AMET University, Kanathur, Chennai - 603112, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 36 (2015), Pagination:Abstract
Cloud Computing is very flexible in nature that helps to quickly access the resources efficiently from the third party service provider to expand the business with low capitalization cost. A cloud storage system stores large number of data in its storage server. Since the data is stored for a long term over the internet it does not provide the data confidentiality and make the hackers to steal the data provided in the storage system and even when data forwarded to cloud environment, it lacks data integrity and makes the cloud user unsatisfied. In this paper, we study about different encryption technique to protect the cloud storage environment. This paper concisely covers some of the existing cryptographic approaches that can be used to improve the security in cloud environment.Keywords
Cryptographic Approaches, Cloud Storage System- Implementing Inference Revelation System for a Database
Abstract Views :147 |
PDF Views:0
Authors
Affiliations
1 Information Technology, AMET University, Chennai - 603112, Tamil Nadu, IN
2 Department of E-Governance, AMET University, Chennai - 603112, Tamil Nadu,, IN
3 Information Technology, AMET University, Chennai - 603112, Tamil Nadu,, IN
1 Information Technology, AMET University, Chennai - 603112, Tamil Nadu, IN
2 Department of E-Governance, AMET University, Chennai - 603112, Tamil Nadu,, IN
3 Information Technology, AMET University, Chennai - 603112, Tamil Nadu,, IN
Source
Indian Journal of Science and Technology, Vol 9, No 48 (2016), Pagination:Abstract
Dispatched client of the database may endeavour change those relationship «around the data so as will derive or understand those fragile information beginning with those threatening data get. Acceptance will be a system a client could use ought to whip right control instruments to database structure. An enlistment recognizable proof structure might be required to make sense of whether customers could utilize charged got to data with interpret sensitive information. In perspective of the space of the database semantic acceptance distinguishing proof system will be framed. That probability about getting access to span of the season of the customer is registered when each shot the customer acts those request. That client requests a will an opportunity to be blocked in the acceptance probability quality outperforms those pre-indicated edge restrain. By this, those will be abstained from beginning with surmising the fragile data. Thusly we make a model for evaluating acceptance subordinate upon those request progressions.Keywords
Access, Database, Framework, Information, Security- Analysis of Cloud Computing Technology
Abstract Views :125 |
PDF Views:0
Authors
Affiliations
1 AMET University, Kanathur, Chennai - 603112, Tamil Nadu, IN
1 AMET University, Kanathur, Chennai - 603112, Tamil Nadu, IN