Abstract

Imperative Requirements for Data Security in Cloud Computing

Highlights

  • Cloud computing is an illustration for widely useful and on-demand network access to a shared pool of customize computing resources that can be quickly provisioned and released with simple management effort

  • Vendor does not leak the physical locations where all the data‘s are stored. Another important privacy challenge in cloud computing is the basic characteristics of information source; where data and information come from different sources

  • Confidentiality: In Cloud Computing, several sensitive data information shared in the cloud, it demands the cloud data storage and shared service to be trustworthy for secure, reliable and efficient distribution of data content to probably large number of authorized users on behalf of data service providers

Read more

Summary

Kiran Kumar

Abstract—Cloud Computing is a popular buzzword currently in the market, the essential concerns for both Cloud providers and consumers are Confidentiality, Integrity, Availability, Authenticity, and Privacy. Cloud service provider and the cloud service consumer must and should make sure that the cloud is stay protected from all the external threats and risks so that the customer does not get any problem such as loss of data or data theft. There is an instance where a malicious user can entered in to the cloud by acting like a legitimate user, in consequence infecting the entire cloud and that effects many customers who are sharing the affected cloud. In this we will discuss how to administer security for the data from the unauthorized users and accommodating integrity to the users

INTRODUCTION
EXISTING WORK
PRESENT WORK
Data Security and Privacy
Identity and Access Management
Proposed System
DESCRIPTION
AES ALGORITHM
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.