Abstract

A comprehensive and functional approach is built in cloud computing, which can be used by cloud users to exchange information. Cloud service providers (CSPs) can transfer through server services through powerful data centres to cloud users. Data is protected through authentication of cloud users and CSPs can have outsourced data file sharing security assurance. The continuing change in cloud users, especially unauthenticated users or third parties poses a critical problem in ensuring privacy in data sharing. The multifunctional exchange of information while protecting information and personal protection from unauthorized or other third-party users remains a daunting challenge

Highlights

  • The current scenario shows the rapid development of cloud[1][2][3][4][5][6] wireless networks[7][8]and sensor network system [9][10][11], including superior software, on-demand access of data and server services

  • The results show that this scheme is successful for cipher text attacks with better collision resistance in the benchmark prototype

  • Stable data sharing is an imperative apprehension in cloud-based communities

Read more

Summary

Introduction

The current scenario shows the rapid development of cloud[1][2][3][4][5][6] wireless networks[7][8]and sensor network system [9][10][11], including superior software, on-demand access of data and server services. This study is aimed at analysing and addressing together; data privacy and protection issues in cloud storage environments faced by clients. This compares the encryption method, analysing the performance factor, comparing features and computational complexity among current schemes which relate dynamically to group data sharing. F the data proprietor must be able to remove any group member's right of access to shared information. The main purpose of presented work is addressing relevance of community data sharing in cloud environment (in dynamic groups). Assess the comparison of performance, feature and calculation complexity between existing systems relating to group data sharing

Cloud Computing Summary
Literature Review
Conclusion
Future Direction

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.