Journal articles on the topic 'Cloud data storage'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cloud data storage.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
A.Mounika, A. Mounika, and C. Srinivas C.Srinivas. "Enabling Dynamic Data In Cloud Storage." International Journal of Scientific Research 1, no. 5 (June 1, 2012): 25–27. http://dx.doi.org/10.15373/22778179/oct2012/9.
Full textAiyer, Viswanath, Rohit Bhutkar, Sagar Anvekar, and Dinesh Chavan. "Guaranteeing Data Storage Security in Cloud Computing." International Journal of Engineering Research 4, no. 5 (May 1, 2015): 231–34. http://dx.doi.org/10.17950/ijer/v4s5/504.
Full textMahida, Ankur. "Secure Data Outsourcing Techniques for Cloud Storage." International Journal of Science and Research (IJSR) 13, no. 4 (April 5, 2024): 181–84. http://dx.doi.org/10.21275/sr24402065432.
Full textYolchuyev, Agil, and Janos Levendovszky. "Data Chunks Placement Optimization for Hybrid Storage Systems." Future Internet 13, no. 7 (July 11, 2021): 181. http://dx.doi.org/10.3390/fi13070181.
Full textXIE, Hua-cheng, and Xiang-dong CHEN. "Cloud storage-oriented unstructured data storage." Journal of Computer Applications 32, no. 6 (August 24, 2013): 1924–28. http://dx.doi.org/10.3724/sp.j.1087.2012.01924.
Full textBhavani, S. Durga, Gudlanarva Sudhakar, and Ujjwal Karna. "Data Storage Security in Cloud Computing: A Survey." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 1 (January 30, 2017): 52–57. http://dx.doi.org/10.23956/ijarcsse/v7i1/0148.
Full textJaikar, S. P. "Securing Cloud Data Storage." IOSR Journal of Computer Engineering 1, no. 6 (2012): 43–49. http://dx.doi.org/10.9790/0661-0164349.
Full textEkta, Mrinal. "Secured Cloud Data Sharing: Privacy-Preserving Storage Optimization with Data Confidentiality." International Journal of Research Publication and Reviews 4, no. 8 (August 2023): 2957–66. http://dx.doi.org/10.55248/gengpi.4.823.51935.
Full textK L, Anitha, and T. R. Gopalakrishnan Nair. "Data storage lock algorithm with cryptographic techniques." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (October 1, 2019): 3843. http://dx.doi.org/10.11591/ijece.v9i5.pp3843-3849.
Full textNaga Chandrika H, Et al. "Data Security on Backed Up Data and Recovery in Cloud Storage." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (November 5, 2023): 4563–74. http://dx.doi.org/10.17762/ijritcc.v11i9.9971.
Full textM, Jayasarathi, Rajeshwari S, Shiny Mercy I, and Rathika S.K.B. "Enhanced on Data Encryption Standard for Secured Cloud Storage." Bonfring International Journal of Software Engineering and Soft Computing 9, no. 1 (March 29, 2019): 07–10. http://dx.doi.org/10.9756/bijsesc.9004.
Full textSantiko, Irfan, and Rahman Rosidi. "PEMANFAATAN PRIVATE CLOUD STORAGE SEBAGAI MEDIA PENYIMPANAN DATA E-LEARNING PADA LEMBAGA PENDIDIKAN." JURNAL TEKNIK INFORMATIKA 10, no. 2 (January 29, 2018): 137–46. http://dx.doi.org/10.15408/jti.v10i2.6992.
Full textPykulytsky, Oleh, and Bohdan Havano. "Cloud Key-Value Storage." Advances in Cyber-Physical Systems 8, no. 2 (November 10, 2023): 133–41. http://dx.doi.org/10.23939/acps2023.02.133.
Full textAl-Museelem, Waleed, and Chun Lin Li. "Data Security and Data Privacy in Cloud Computing." Advanced Materials Research 905 (April 2014): 687–92. http://dx.doi.org/10.4028/www.scientific.net/amr.905.687.
Full textUjloomwale, Mrs Niyamat, and Mrs Ranjana Badre. "Data storage security in Cloud." IOSR Journal of Computer Engineering 16, no. 6 (2014): 50–56. http://dx.doi.org/10.9790/0661-16635056.
Full textJahnavi, R. "Data storage operations protection in mobile cloud computing." i-manager’s Journal on Cloud Computing 10, no. 2 (2023): 43. http://dx.doi.org/10.26634/jcc.10.2.20418.
Full textAli, M., N. Q. Soomro, H. Ali, A. Awan, and M. Kirmani. "Distributed File Sharing and Retrieval Model for Cloud Virtual Environment." Engineering, Technology & Applied Science Research 9, no. 2 (April 10, 2019): 4062–65. http://dx.doi.org/10.48084/etasr.2662.
Full textPrasad, Shweta Sukhram, and Aarti Kanahiyalal Yadava. "Research on Cloud Data Storage Security." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (June 30, 2022): 3507–10. http://dx.doi.org/10.22214/ijraset.2022.44694.
Full textCai, Ze Hua, Shun Yan Wang, Shang Yin Long, and Hai Tao Zhou. "A Data Storage and Management Scheme in Cloud Storage Model." Applied Mechanics and Materials 347-350 (August 2013): 2395–99. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.2395.
Full textShaharkar, Bhushan B., and Darshan P. Pandit. "ML Based Authentication Scheme for Data Storage in Cloud Based IoT." International Journal of Engineering and Advanced Technology 11, no. 6 (August 30, 2022): 123–27. http://dx.doi.org/10.35940/ijeat.f3767.0811622.
Full textT, Manindra, and Pradeep K. V. "DATA COMPRESSION TECHNIQUE FOR CLOUD STORAGE IN MULTI-USER ENVIRONMENTS." Asian Journal of Pharmaceutical and Clinical Research 10, no. 13 (April 1, 2017): 82. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.19570.
Full textYang, Jing Bo, Shu Huang, and Pan Jiang. "Research on Distributed Heterogeneous Data Storage Algorithm in Cloud Computing Data Center." Applied Mechanics and Materials 624 (August 2014): 553–56. http://dx.doi.org/10.4028/www.scientific.net/amm.624.553.
Full textSermakani, A. M., and D. Paulraj. "Effective Data Storage and Dynamic Data Auditing Scheme for Providing Distributed Services in Federated Cloud." Journal of Circuits, Systems and Computers 29, no. 16 (June 22, 2020): 2050259. http://dx.doi.org/10.1142/s021812662050259x.
Full textPrabhdeep Singh and Ashish Kumar Pandey. "A Review on Cloud Data Security Challenges and existing Countermeasures in Cloud Computing." International Journal of Data Informatics and Intelligent Computing 1, no. 2 (December 21, 2022): 23–33. http://dx.doi.org/10.59461/ijdiic.v1i2.33.
Full textRao., Chenna. "FINANCIAL DATA SECURITY USING BLOCK CHAIN AND PROXY RE ENCRYPTION." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 03 (March 20, 2024): 1–5. http://dx.doi.org/10.55041/ijsrem29399.
Full textArchana, K., and Mrs Shubangini Patil. "Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage." International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (June 30, 2018): 2273–77. http://dx.doi.org/10.31142/ijtsrd14486.
Full textP, Sabarisha Malathi, and Vanathi Dr.D. "A Study of Data Storage Security Issues in Cloud Computing." Bonfring International Journal of Software Engineering and Soft Computing 9, no. 2 (April 30, 2019): 05–07. http://dx.doi.org/10.9756/bijsesc.9012.
Full textK. Sunitha, K. Sunitha, V. Tejaswini V. Tejaswini, and S. K. Prashanth S.K. Prashanth. "Ensuring Availability and Integrity of Data Storage in Cloud Computing." Paripex - Indian Journal Of Research 2, no. 2 (January 15, 2012): 119–22. http://dx.doi.org/10.15373/22501991/feb2013/40.
Full textBommannan, Sri, Prabakaran P, Gokulraj S, and Ilavarasi S. "Duplicate Detection on Cloud Data with Re-Encryption Based Data Sharing." International Research Journal of Computer Science 11, no. 04 (April 5, 2024): 257–65. http://dx.doi.org/10.26562/irjcs.2024.v1104.20.
Full textVithya Vijayalakshmi, A., N. Veeraragavan, and L. Arockiam. "A Unified Model for Cloud Data Confidentiality." Asian Journal of Science and Applied Technology 7, no. 1 (May 5, 2018): 23–27. http://dx.doi.org/10.51983/ajsat-2018.7.1.2786.
Full textLi, Qiang, Kui Yang, and Li Ma. "Data Security Research for Cloud Computing." Applied Mechanics and Materials 687-691 (November 2014): 2764–67. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2764.
Full textShevtsov, Vadim, and Evgeny Abramov. "The Analysis of Modern Data Storage Systems." NBI Technologies, no. 1 (August 2019): 25–30. http://dx.doi.org/10.15688/nbit.jvolsu.2019.1.5.
Full textMule, Balakrishna Reddy, Rishi Raj Kumar, Gude Srinivasulu, Gaddam Ranga Uday Sudheer, and Dr K. Bala. "Secure Data Storage Using Erasure-Coding in Cloud Environment." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (May 31, 2023): 872–75. http://dx.doi.org/10.22214/ijraset.2023.51636.
Full textJoshi, Pratik R. "Deduplication using Cloud Computing." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (April 6, 2024): 1–5. http://dx.doi.org/10.55041/ijsrem30186.
Full textBasry, Asril. "PENYIMPANAN DATA BERBASIS CLOUD SEBAGAI MITIGASI BENCANA KERUSAKAN DATA." Simetris : Jurnal Teknik Mesin, Elektro dan Ilmu Komputer 6, no. 2 (November 1, 2015): 249. http://dx.doi.org/10.24176/simet.v6i2.460.
Full textChai, Zhi Gang, Ming Zhao, and Xiao Yu. "Based on Cloud-Technology Data Storage Security." Applied Mechanics and Materials 556-562 (May 2014): 6179–83. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.6179.
Full textGautam, Pratiksha, Mohd Dilshad Ansari, and Surender Kumar Sharma. "Enhanced Security for Electronic Health Care Information Using Obfuscation and RSA Algorithm in Cloud Computing." International Journal of Information Security and Privacy 13, no. 1 (January 2019): 59–69. http://dx.doi.org/10.4018/ijisp.2019010105.
Full textHuang, Lin Na, and Feng Hua Liu. "Data Storage Technology and its Development Based on Cloud Computing." Advanced Materials Research 756-759 (September 2013): 1275–79. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1275.
Full textkumar, Nishant. "Securely Cloud Data Storage and Sharing." Journal of Informatics Electrical and Electronics Engineering (JIEEE) 5, no. 1 (2024): 1–12. http://dx.doi.org/10.54060/jieee.2024.66.
Full textGovinda, K., and E. Sathiyamoorthy. "Privacy Preservation of a Group and Secure Data Storage in Cloud Environment." Cybernetics and Information Technologies 15, no. 1 (March 1, 2015): 46–54. http://dx.doi.org/10.1515/cait-2015-0005.
Full textChen, Hong Jun, Tao Tan, and Xue Qin Wu. "Research of Cloud Storage and Data Read-Write Technology." Applied Mechanics and Materials 347-350 (August 2013): 3555–59. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.3555.
Full textKUMAR, Mr M. A. R., and Mrs SRILATHA PULI. "FINDING DATA DEDUPLICATION USING CLOUD." YMER Digital 21, no. 05 (May 7, 2022): 136–42. http://dx.doi.org/10.37896/ymer21.05/17.
Full textMollahasani, Mahdi, Raheleh Kooshesh, and Mahdiyeh Barzegar. "Secure Cloud Data Storage Services in the Hybrid Cloud." Research Journal of Applied Sciences, Engineering and Technology 7, no. 10 (March 15, 2014): 2172–74. http://dx.doi.org/10.19026/rjaset.7.512.
Full textMeikshan, Vladimir, and Natalia Teslya. "Selection of optimal data placement using cloud infrastructure." Proceedings of the Russian higher school Academy of sciences, no. 2 (July 21, 2021): 34–42. http://dx.doi.org/10.17212/1727-2769-2021-2-34-42.
Full textZeng, Wen Ying, and Yue Long Zhao. "Mobile Storage and Data Security Management Research." Applied Mechanics and Materials 325-326 (June 2013): 1661–64. http://dx.doi.org/10.4028/www.scientific.net/amm.325-326.1661.
Full textWang, Ning. "Analysis and Research of Data Security Policy Based on Cloud Storage." Advanced Materials Research 912-914 (April 2014): 1160–63. http://dx.doi.org/10.4028/www.scientific.net/amr.912-914.1160.
Full textTamrakar, Dr Ashish Kumar, Dr Abhishek Verma, Dr Vishnu Kumar Mishra, and Dr Megha Mishra. "A Study on Cloud Storage Security Method Using Data Classification." Journal of University of Shanghai for Science and Technology 23, no. 09 (September 24, 2021): 1105–21. http://dx.doi.org/10.51201/jusst/21/09657.
Full textFanglin An, Fanglin An, Jun Ye Fanglin An, and Zhen Guo Jun Ye. "A New Data Integrity Verification Scheme with Low Communication Cost." 網際網路技術學刊 24, no. 2 (March 2023): 283–90. http://dx.doi.org/10.53106/160792642023032402007.
Full textPajany M. and Zayaraz G. "A Robust Lightweight Data Security Model for Cloud Data Access and Storage." International Journal of Information Technology and Web Engineering 16, no. 3 (July 2021): 39–53. http://dx.doi.org/10.4018/ijitwe.2021070103.
Full textUmair Waqas. "ARCPS - Anti-Redundant Cloud & Public Storage Moving towards Intelligent Cloud." Lahore Garrison University Research Journal of Computer Science and Information Technology 1, no. 3 (September 30, 2017): 26–36. http://dx.doi.org/10.54692/lgurjcsit.2017.010320.
Full text