To see the other types of publications on this topic, follow the link: Cloud data storage.

Journal articles on the topic 'Cloud data storage'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cloud data storage.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

A.Mounika, A. Mounika, and C. Srinivas C.Srinivas. "Enabling Dynamic Data In Cloud Storage." International Journal of Scientific Research 1, no. 5 (June 1, 2012): 25–27. http://dx.doi.org/10.15373/22778179/oct2012/9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Aiyer, Viswanath, Rohit Bhutkar, Sagar Anvekar, and Dinesh Chavan. "Guaranteeing Data Storage Security in Cloud Computing." International Journal of Engineering Research 4, no. 5 (May 1, 2015): 231–34. http://dx.doi.org/10.17950/ijer/v4s5/504.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mahida, Ankur. "Secure Data Outsourcing Techniques for Cloud Storage." International Journal of Science and Research (IJSR) 13, no. 4 (April 5, 2024): 181–84. http://dx.doi.org/10.21275/sr24402065432.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yolchuyev, Agil, and Janos Levendovszky. "Data Chunks Placement Optimization for Hybrid Storage Systems." Future Internet 13, no. 7 (July 11, 2021): 181. http://dx.doi.org/10.3390/fi13070181.

Full text
Abstract:
“Hybrid Cloud Storage” (HCS) is a widely adopted framework that combines the functionality of public and private cloud storage models to provide storage services. This kind of storage is especially ideal for organizations that seek to reduce the cost of their storage infrastructure with the use of “Public Cloud Storage” as a backend to on-premises primary storage. Despite the higher performance, the hybrid cloud has latency issues, related to the distance and bandwidth of the public storage, which may cause a significant drop in the performance of the storage systems during data transfer. This issue can become a major problem when one or more private storage nodes fail. In this paper, we propose a new framework for optimizing the data uploading process that is currently used with hybrid cloud storage systems. The optimization is concerned with spreading the data over the multiple storages in the HCS system according to some predefined objective functions. Furthermore, we also used Network Coding technics for minimizing data transfer latency between the receiver (private storages) and transmitter nodes.
APA, Harvard, Vancouver, ISO, and other styles
5

XIE, Hua-cheng, and Xiang-dong CHEN. "Cloud storage-oriented unstructured data storage." Journal of Computer Applications 32, no. 6 (August 24, 2013): 1924–28. http://dx.doi.org/10.3724/sp.j.1087.2012.01924.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bhavani, S. Durga, Gudlanarva Sudhakar, and Ujjwal Karna. "Data Storage Security in Cloud Computing: A Survey." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 1 (January 30, 2017): 52–57. http://dx.doi.org/10.23956/ijarcsse/v7i1/0148.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jaikar, S. P. "Securing Cloud Data Storage." IOSR Journal of Computer Engineering 1, no. 6 (2012): 43–49. http://dx.doi.org/10.9790/0661-0164349.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ekta, Mrinal. "Secured Cloud Data Sharing: Privacy-Preserving Storage Optimization with Data Confidentiality." International Journal of Research Publication and Reviews 4, no. 8 (August 2023): 2957–66. http://dx.doi.org/10.55248/gengpi.4.823.51935.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

K L, Anitha, and T. R. Gopalakrishnan Nair. "Data storage lock algorithm with cryptographic techniques." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (October 1, 2019): 3843. http://dx.doi.org/10.11591/ijece.v9i5.pp3843-3849.

Full text
Abstract:
<span>The cloud computing had its impact far and wide, and Enterprise solutions are getting migrated to different types of clouds. The services are delivered from the data centers which are located all over the world. As the data is roaming with less control in any data centers, data security issues in cloud are very challenging. Therefore we need multi-level authentication, data integrity, privacy and above all encryption to safeguard our data which is stored on to the cloud. The data and applications cannot be relocated to a virtual server without much degree of security concern as there can be much confidential data or mission-critical applications. In this paper, we propose Data Storage Lock Algorithm (DSLA) to store confidential data thereby provides secure data storage in cloud computing based on cryptographic standards.</span>
APA, Harvard, Vancouver, ISO, and other styles
10

Naga Chandrika H, Et al. "Data Security on Backed Up Data and Recovery in Cloud Storage." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (November 5, 2023): 4563–74. http://dx.doi.org/10.17762/ijritcc.v11i9.9971.

Full text
Abstract:
Cloud provides its users with different services. Every day during cloud computing, a great deal of data is generated. On the cloud servers, the data is being saved. A recovery tool should be created in case this data is lost from the server. One such setup is described in this consideration. The proposed approach would enable simultaneous data storage on the inaccessible server and the cloud server. The information is returned from the farther server when the key record is misplaced. Secret key security is ensured so that the authentication is secure and authorized by the user based on the attributes of backup and recovery. A cloud is a distinct Information Technology infrastructure designed to provide its users with different facilities that can be gotten to remotely. Cloud alludes to the term arrange of systems that back get to decentralized Data Innovation assets. Cloud employments the Web as well as the inaccessible central servers to manage consumers and businessmen's data and applications. This helps to save the consumer from costs and room problems. It is a technology that makes data collection, processing, and bandwidth much more centralized. A cloud encompasses a certain restrain, because it could be a certain system utilized to supply assets remotely. The Web offers get to an endless number of clouds. Though the Web offers free get to a few web-based Information Technology services, a cloud is generally private and provides wireless data resources. Much of the Internet is accessible via the web service to Information Technology services. On the other hand, the Information Technology services supplied by cloud environments are intended to provide back-end computing capabilities and browser access..
APA, Harvard, Vancouver, ISO, and other styles
11

M, Jayasarathi, Rajeshwari S, Shiny Mercy I, and Rathika S.K.B. "Enhanced on Data Encryption Standard for Secured Cloud Storage." Bonfring International Journal of Software Engineering and Soft Computing 9, no. 1 (March 29, 2019): 07–10. http://dx.doi.org/10.9756/bijsesc.9004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Santiko, Irfan, and Rahman Rosidi. "PEMANFAATAN PRIVATE CLOUD STORAGE SEBAGAI MEDIA PENYIMPANAN DATA E-LEARNING PADA LEMBAGA PENDIDIKAN." JURNAL TEKNIK INFORMATIKA 10, no. 2 (January 29, 2018): 137–46. http://dx.doi.org/10.15408/jti.v10i2.6992.

Full text
Abstract:
ABSTRAK Cloud Computing atau komputasi awan adalah gabungan pemanfaatan teknologi komputer ('komputasi') dan pengembangan berbasis Internet ('awan'). Awan (cloud) adalah metafora dari internet, sebagaimana awan yang sering digambarkan pada diagram jaringan computer. Selain seperti awan dalam diagram jaringan komputer, awan (cloud) dalam cloud computing juga merupakan abstraksi dari infrastuktur kompleks yang disembunyikannya. Private Cloud Storage dengan kolaborasi komponen Service Oriented Architecture mampu menyediakan antarmuka yang efisien untuk proses berjalannya lembaga dan berfungsi sebagai Virtualization Server dan Online Storage yang dapat diakses menggunakan Fixed Device dan Mobile Device seperti Smartphone Android, Komputer Pad, dan PC Tablet melalui koneksi jaringan lokal dan internet.Sebagai fungsi manfaat dari cloud sendiri bisa di manfaatkan kedalam kebutuhan E-Learning, mengingat dari segi kemudahan, kebutuhan, dan keamanan, cloud computing terbilang metode yang pas dalam menerapkan kebutuhan tersebut. Dimana setiap data berhak di simpan secara bebas, luas dan aman tentunya. ABSTRACT Cloud Computing is a combination of the use of computer technology and cloud of Internet-based development. Clouds are metaphors of the Internet, as are clouds that are often depicted in computer network diagrams. In addition to clouds in computer network diagrams, clouds in computing technology are also an abstraction of the complex infrastructure it conceals. Private Cloud Storage with Service Oriented Architecture component collaboration is able to provide an efficient interface for the running process of the institution and serves as Virtualization Server and Online Storage that can be accessed using Fixed Devices and Mobile Devices such as Android Smartphone, Pad Computer and Tablet PC via local network connection and Internet.As function of the benefits of the cloud itself can be utilized into the needs of E-Learning, given the ease, needs, and security, cloud computing spelled out the right method in applying these needs. Where every data is entitled to save freely, broadly and safely of course.How to Cite : Santiko, I. Rosidi, R., Wibawa. S. A (2017). PEMANFAATAN PRIVATE CLOUD STORAGE SEBAGAI MEDIA PENYIMPANAN DATA E-LEARNING PADA LEMBAGA PENDIDIKAN. Jurnal Teknik Informatika, 10(2), 137-146. doi:10.15408/jti.v10i2.6992Permalink/DOI: http://dx.doi.org/10.15408/jti.v10i2.6992
APA, Harvard, Vancouver, ISO, and other styles
13

Pykulytsky, Oleh, and Bohdan Havano. "Cloud Key-Value Storage." Advances in Cyber-Physical Systems 8, no. 2 (November 10, 2023): 133–41. http://dx.doi.org/10.23939/acps2023.02.133.

Full text
Abstract:
The paper represents all the stages of designing, architecting, and developing cloud-based key-value storage. This work aims to bring new approaches to distributed data systems. The authors focus on the security and productivity of the project as well as security and maintainability. The authors have studied the use of hash tables in a multi-threaded environment. Architectural approaches and tools have been described. The general structure of the key-value storage server has been presented. The server algorithm has been presented. Our research delves into the intricate nuances of utilizing hash tables in a multi-threaded environment, shedding light on the intricacies and challenges of managing concurrent access to key-value data structures. The authors have explored the trade-offs between lock-free designs and traditional locking approaches.
APA, Harvard, Vancouver, ISO, and other styles
14

Al-Museelem, Waleed, and Chun Lin Li. "Data Security and Data Privacy in Cloud Computing." Advanced Materials Research 905 (April 2014): 687–92. http://dx.doi.org/10.4028/www.scientific.net/amr.905.687.

Full text
Abstract:
Cloud computing has led to the development of IT to more sophisticated levels by improving the capacity and flexibility of data storage and by providing a scalable computation and processing power which matches the dynamic data requirements. Cloud computing has many benefits which has led to the transfer of many enterprise applications and data to public and hybrid clouds. However, many organizations refer to the protection of privacy and the security of data as the major issues which prevent them from adopting cloud computing. The only way successful implementation of clouds can be achieved is through effective enhancement and management of data security and privacy in clouds. This research paper analyzes the privacy and protection of data in cloud computing through all data lifecycle stages providing an overall perspective of cloud computing while highlighting key security issues and concerns which should be addressed. It also discusses several current solutions and further proposes more solutions which can enhance the privacy and security of data in clouds. Finally, the research paper describes future research work on the protection of data privacy and security in clouds.
APA, Harvard, Vancouver, ISO, and other styles
15

Ujloomwale, Mrs Niyamat, and Mrs Ranjana Badre. "Data storage security in Cloud." IOSR Journal of Computer Engineering 16, no. 6 (2014): 50–56. http://dx.doi.org/10.9790/0661-16635056.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Jahnavi, R. "Data storage operations protection in mobile cloud computing." i-manager’s Journal on Cloud Computing 10, no. 2 (2023): 43. http://dx.doi.org/10.26634/jcc.10.2.20418.

Full text
Abstract:
Cloud computing is revolutionizing Customer Internet computing and the IT industry by integrating with mobile environments through remote access technologies. This growth involves using smartphones and sensors as data collection nodes interacting with the cloud. However, widespread adoption faces a hurdle in data security concerns, as users are hesitant about entrusting sensitive data to public clouds operated by external providers. To tackle barriers in cloud computing, we urgently require innovative and secure management architectures. This paper introduces a comprehensive framework addressing user concerns, focusing on secure data sharing in the cloud. The framework covers aspects like transport, aggregation, usage, and destruction of sensitive data, emphasizing the semi-trusted nature of the cloud to boost user confidence and address security concerns. One key aspect of the proposed framework is the integration of the Kerberos protocol over the network. This protocol plays a pivotal role in establishing secure and authenticated communication channels, ensuring the confidentiality and integrity of the data being transferred within the cloud infrastructure. Additionally, the paper introduces a user process protection method based on a virtual machine monitor. This method contributes to enhancing overall system security by providing a layer of isolation and protection for user processes operating in the cloud environment. The combined integration of the Kerberos protocol and the virtual machine monitor-based user process protection method forms a cohesive approach towards realizing robust system functionalities. By offering a secure foundation for data management in the cloud, this framework addresses the current limitations and instills a sense of trust among users, fostering a more widespread and confident adoption of cloud computing techniques.
APA, Harvard, Vancouver, ISO, and other styles
17

Ali, M., N. Q. Soomro, H. Ali, A. Awan, and M. Kirmani. "Distributed File Sharing and Retrieval Model for Cloud Virtual Environment." Engineering, Technology & Applied Science Research 9, no. 2 (April 10, 2019): 4062–65. http://dx.doi.org/10.48084/etasr.2662.

Full text
Abstract:
Cloud-based storage services are multiplying and are being adapted mostly for data storage. At the same time, many potential problems pertaining to data storage and security are being addressed. This research provides the architecture for splitting user data and the solution in retrieving different data chunks, stored on different cloud storages. By doing this, not only the load on a single server is reduced but security and storage are efficiently used. Data would be stored and retrieved in slices, hence the chances of data forgery are diminishing. File processing will be faster as split parts would be fetched from different clouds, enabling parallel processing.
APA, Harvard, Vancouver, ISO, and other styles
18

Prasad, Shweta Sukhram, and Aarti Kanahiyalal Yadava. "Research on Cloud Data Storage Security." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (June 30, 2022): 3507–10. http://dx.doi.org/10.22214/ijraset.2022.44694.

Full text
Abstract:
Abstract: Cloud computing is a revolutionary mechanism that changing way to enterprise hardware and software design and procurements. Because of cloud simplicity everyone is moving data and application software to cloud data centers there still exist significant issues that need to be considered before shifting into cloud. Security stands as major obstacle in cloud computing. This paper gives an overview of the security issues on data storage along with its possible solutions many companies are not ready to implement cloud computing technology due to lack of proper security control policy and weakness in protection which lead to many challenge in cloud computing. An independent mechanism is required to make sure that data is correctly hosted in to the cloud storage server. In this paper, we will discuss the different techniques that are used for secure data storage on cloud. This paper also provides a process to avoid Collusion attacks of server modification by unauthorized users.
APA, Harvard, Vancouver, ISO, and other styles
19

Cai, Ze Hua, Shun Yan Wang, Shang Yin Long, and Hai Tao Zhou. "A Data Storage and Management Scheme in Cloud Storage Model." Applied Mechanics and Materials 347-350 (August 2013): 2395–99. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.2395.

Full text
Abstract:
The cloud storage is the evolution of the cloud computing system, which is based on data storage and management. This thesis is focused on the discussion of the cloud storage model that is built on the Cloud Storage Access Protocol of SNIA, and puts forward the concept of storage pooling at storage management layer with unified virtualization and dynamic management on physical storage devices. The thesis also compares the typical DFS (Distributed File System) on the data management layer in different data conditions.
APA, Harvard, Vancouver, ISO, and other styles
20

Shaharkar, Bhushan B., and Darshan P. Pandit. "ML Based Authentication Scheme for Data Storage in Cloud Based IoT." International Journal of Engineering and Advanced Technology 11, no. 6 (August 30, 2022): 123–27. http://dx.doi.org/10.35940/ijeat.f3767.0811622.

Full text
Abstract:
Today, organizations are using IoT devices to accurately collect real data and make better business decisions to increase customer satisfaction. The data collected should be stored and stored in a well-designed storage system, which encourages companies to review their data storage infrastructure. The company needs to store data created by the Internet of Things, and that data grows exponentially, forcing IoT to think about cloud storage for data storage. Security issues are a major concern when handling and processing data in DI and cloud environments. Secure integration of IoT and cloud computing, and introduced a model to ensure this integration. The secure database of any IoT operating system was suffers from poorly protected read and write functions, which limits data storage on any IoT platform. In addition, clouds can provide space to store a wide variety of data that plays an important role in the world of cyber security. However, large centralized systems operating in the cloud are also very vulnerable due to their power, so they can be transformed into a kind of double-edged sword. In this paper, we propose a novel secure lightweight authentication scheme for data storage (SLA-DS) in IoT and cloud server. The SLA-DS integrates IoT and cloud technology combination which mainly focuses on security issues.
APA, Harvard, Vancouver, ISO, and other styles
21

T, Manindra, and Pradeep K. V. "DATA COMPRESSION TECHNIQUE FOR CLOUD STORAGE IN MULTI-USER ENVIRONMENTS." Asian Journal of Pharmaceutical and Clinical Research 10, no. 13 (April 1, 2017): 82. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.19570.

Full text
Abstract:
In many associations, the cloud storages contain a copy (duplicates) of information. For example, the same file would be spared in various locations by different users; too many documents that are not differentiable may in any case duplication a great part of the same data. This consumes lots of memory in cloud storage. Deduplication is a kind of technique used to eliminate duplicate entries on cloud storage. It helps us to remove the duplicate entries of these additional duplicates, by maintaining only one duplicate of the information and giving ownership rights to the alternate duplicates with pointers that lead back to the first duplicate. Organizations much of the time utilizes this technique in cloud storage for many applications, yet it can be effectively utilized to free up space in vital situations also. To allow an end-user to have the ownership of the file if the file is already existing and should terminate the uploading process to the cloud storage server
APA, Harvard, Vancouver, ISO, and other styles
22

Yang, Jing Bo, Shu Huang, and Pan Jiang. "Research on Distributed Heterogeneous Data Storage Algorithm in Cloud Computing Data Center." Applied Mechanics and Materials 624 (August 2014): 553–56. http://dx.doi.org/10.4028/www.scientific.net/amm.624.553.

Full text
Abstract:
With the development of cloud computing, data center is also improved. cloud computing data center contains hundreds, even million of servers or PCs. It has many heterogeneous resources. Data center is a key to promise high scalability and resource usage of cloud computing. In addition, replica is introduced into data center, which is an important method to improve availability and performance. In this paper, the research on distributed storage algorithm based on the cloud computing. This algorithm uses the design of system storage level indicators within classification of massive data storage mechanism to solve the allocation problem of data consistency between the data center; and send communication packets between data centers through the cloud computing. The full storage can achieve complete local storage of each data stream, and solve the original data stream unusually large-scale data storage allocation problem.
APA, Harvard, Vancouver, ISO, and other styles
23

Sermakani, A. M., and D. Paulraj. "Effective Data Storage and Dynamic Data Auditing Scheme for Providing Distributed Services in Federated Cloud." Journal of Circuits, Systems and Computers 29, no. 16 (June 22, 2020): 2050259. http://dx.doi.org/10.1142/s021812662050259x.

Full text
Abstract:
Recently, many organizations and industries are using the cloud computing technologies for exchanging the resources and their confidential data. For this purpose, many cloud services are available and also provide the facility to categorize their users as private and public users for accessing their own data from private cloud and public cloud. The combination of these two clouds is called federated cloud which facilitates to allow both kinds of cloud users for accessing their own data on same cloud database. In this scenario, the authorization and authentication process is becoming complex task on cloud. For providing the facility to access their own data only from federated cloud, a new secured data storage and retrieval algorithm called AES and Triple-DES-based Secured Storage and Retrieval Algorithm (ATDSRA) are proposed for storing the private and public cloud user’s data securely on cloud database. Here, the TDES is used for encrypting the input data, data merging and aggregation methods were used for grouping the encrypted input data. Moreover, a new dynamic data auditing scheme called CRT-based Dynamic Data Auditing Algorithm (CRTDDA) is proposed for conducting the cloud data auditing over the federated cloud and also restricting the data access. The proposed new auditing mechanism that is able to protect the stored data from access violence. In addition, the standard Table64 is used for encryption and decryption processes. The experimental results of this work proves the efficiency of the proposed model in terms of security level.
APA, Harvard, Vancouver, ISO, and other styles
24

Prabhdeep Singh and Ashish Kumar Pandey. "A Review on Cloud Data Security Challenges and existing Countermeasures in Cloud Computing." International Journal of Data Informatics and Intelligent Computing 1, no. 2 (December 21, 2022): 23–33. http://dx.doi.org/10.59461/ijdiic.v1i2.33.

Full text
Abstract:
Cloud computing (CC) is among the most rapidly evolving computer technologies. That is the required accessibility of network assets, mainly information storage with processing authority without the requirement for particular and direct user administration. CC is a collection of public and private data centers that provide a single platform for clients throughout the Internet. The growing volume of personal and sensitive information acquired through supervisory authorities demands the usage of the cloud not just for information storage and for data processing at cloud assets. Nevertheless, due to safety issues raised by recent data leaks, it is recommended that unprotected sensitive data not be sent to public clouds. This document provides a detailed appraisal of the research regarding data protection and privacy problems, data encrypting, and data obfuscation, including remedies for cloud data storage. The most up-to-date technologies and approaches for cloud data security are examined. This research also examines several current strategies for addressing cloud security concerns. The performance of each approach is then compared based on its characteristics, benefits, and shortcomings. Finally, go at a few active cloud storage data security study fields.
APA, Harvard, Vancouver, ISO, and other styles
25

Rao., Chenna. "FINANCIAL DATA SECURITY USING BLOCK CHAIN AND PROXY RE ENCRYPTION." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 03 (March 20, 2024): 1–5. http://dx.doi.org/10.55041/ijsrem29399.

Full text
Abstract:
A significant amount of data is currently preserved via the cloud. A few cryptography is used by Third Party Auditors (TPAs).frequently employed to verify data. more focused methods for requesting cloud data. The goal is to address the privacy and security declaration. By doing this, you may access information via the internet without having to deal with the hassle of web software. cloud-based storage It supports safe data storage on the cloud. Clouds are networked collections of data and mobile applications running on cloud platforms. We will have access to any record, including consumer records, from anywhere in the globe owing to cloud computing. on essence, it may be on the cloud. Used for large parking space, great scalability, and significant financial savings. Security is a problem with cloud computing. Keywords : Financial, Data Security, Block Chain, Proxy Encryption,
APA, Harvard, Vancouver, ISO, and other styles
26

Archana, K., and Mrs Shubangini Patil. "Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage." International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (June 30, 2018): 2273–77. http://dx.doi.org/10.31142/ijtsrd14486.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

P, Sabarisha Malathi, and Vanathi Dr.D. "A Study of Data Storage Security Issues in Cloud Computing." Bonfring International Journal of Software Engineering and Soft Computing 9, no. 2 (April 30, 2019): 05–07. http://dx.doi.org/10.9756/bijsesc.9012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

K. Sunitha, K. Sunitha, V. Tejaswini V. Tejaswini, and S. K. Prashanth S.K. Prashanth. "Ensuring Availability and Integrity of Data Storage in Cloud Computing." Paripex - Indian Journal Of Research 2, no. 2 (January 15, 2012): 119–22. http://dx.doi.org/10.15373/22501991/feb2013/40.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Bommannan, Sri, Prabakaran P, Gokulraj S, and Ilavarasi S. "Duplicate Detection on Cloud Data with Re-Encryption Based Data Sharing." International Research Journal of Computer Science 11, no. 04 (April 5, 2024): 257–65. http://dx.doi.org/10.26562/irjcs.2024.v1104.20.

Full text
Abstract:
Cloud data storage has gained immense popularity in recent years due to its scalability and accessibility. However, the efficient management of data in the cloud, especially with the ever-increasing volume of data, remains a significant challenge. Data deduplication is a crucial technique to reduce storage costs and enhance data management efficiency. It also concerns the secure cloud data storage and sharing. Here implement a novel approach to de duplication-based cloud data storage using chunk-based partitioning. In this approach, data is divided into fixed-size chunks, and a deduplication mechanism is applied to identify and eliminate redundant chunks. The process of duplicate detection leading to improved storage efficiency and reduced data redundancy. It not only conserves storage space but also enhances data retrieval performance by reducing the volume of data to be transferred over the network. Proposed system also enhance the security of cloud data storage by employing Base64 encoding for data representation and implementing re-encryption techniques based on the Advanced Encryption Standard (AES) for secure data sharing. The Base64 encoding methodology is employed to transform binary data into a text format, rendering it less susceptible to unintended manipulations during data transmission and storage. This encoding mechanism ensures data integrity and facilitates its secure storage in cloud environments. By utilizing AES encryption, data shared among users is re-encrypted with unique keys, ensuring that only authorized recipients can access and decrypt the shared information. The proposed approach significantly enhances data confidentiality and mitigates risks associated with unauthorized access, there by fortifying the security of cloud-based data sharing.
APA, Harvard, Vancouver, ISO, and other styles
30

Vithya Vijayalakshmi, A., N. Veeraragavan, and L. Arockiam. "A Unified Model for Cloud Data Confidentiality." Asian Journal of Science and Applied Technology 7, no. 1 (May 5, 2018): 23–27. http://dx.doi.org/10.51983/ajsat-2018.7.1.2786.

Full text
Abstract:
Cloud computing is a developing technology which gets more attention from both the industries and academia. The cloud storage is one of the main benefit in cloud computing, which is particularly attractive for the users who needs unpredictable storage for their enterprises and so on. Minimum storage and processing cost is an obligatory requirement of all organization and industries, while analysis of data and information is mandatory in all organization. Although there is a reduction in cloud storage cost, customers has to face more technical and security problems such as data integrity, confidentiality and availability. If there is no confidentiality, then, there is no guarantee for the data on cloud. Many researches have been proposed number of techniques for data security in the cloud. However, there are still many issues in cloud data storage. The optimum solution to ensure the confidentiality in cloud storage is to encrypt the data whereas encryption alone fails to give high security to the data in the cloud storage. To give maximum protection to cloud storage, this paper proposes a unified combined model of both encryption and obfuscation. Encryption is the process of converting original text and Obfuscation is a process of encrypting numerical type of data, the researchers proved that by combining these two data protection techniques, the data will be more protective on cloud storage.
APA, Harvard, Vancouver, ISO, and other styles
31

Li, Qiang, Kui Yang, and Li Ma. "Data Security Research for Cloud Computing." Applied Mechanics and Materials 687-691 (November 2014): 2764–67. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2764.

Full text
Abstract:
With the popularity of the cloud computing, network technology obtains unprecedented development and revolution. Cloud computing is the direction of cyberspace storage in the computer and internet filed. Big data and multi-dimensional storage and calculation along with the cloud computing. Therefore, internet data security is the key point. For example, based on the cloud environment, the big data transmission and storage requires encryption technology. This article will research the data security of cloud computing, design the service model of data security encryption, and realize data transmission and storage security service of computer and internet cloud environment.
APA, Harvard, Vancouver, ISO, and other styles
32

Shevtsov, Vadim, and Evgeny Abramov. "The Analysis of Modern Data Storage Systems." NBI Technologies, no. 1 (August 2019): 25–30. http://dx.doi.org/10.15688/nbit.jvolsu.2019.1.5.

Full text
Abstract:
Today, Storage Area Network and Cloud Storage are the common Storage System. Storage Area Network includes NAS, SAN, DAS systems. Cloud Storage includes object storage, file storage, block storage. Storage Area Network is an important technology because it may give a lot of data volume with a high recovery chance and secure access, work and central management with data. Cloud Storage has many advantages: data mobility, teamwork, stability, scalability, quick start. The main threats include destruction, theft, corruption, unauthentication, replacement, blocking. Storage Area Network components (architecture elements, protocols, interfaces, hardware, system software, exploitation) have a lot of vulnerabilities. Cloud Storage may be attacked by software, functional elements, clients, hypervisor, management systems. A lot of companies design storage solutions: DropBox, QNAP, WD, DELL, SEAGATE.
APA, Harvard, Vancouver, ISO, and other styles
33

Mule, Balakrishna Reddy, Rishi Raj Kumar, Gude Srinivasulu, Gaddam Ranga Uday Sudheer, and Dr K. Bala. "Secure Data Storage Using Erasure-Coding in Cloud Environment." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (May 31, 2023): 872–75. http://dx.doi.org/10.22214/ijraset.2023.51636.

Full text
Abstract:
Abstract: The current storage mechanism currently stores user data on cloud servers. Thus, users give up their rights. You don't have control over the data and run the danger of privacy violations. Encryption technology is often the cornerstone of the traditional privacy protection strategies even if it is not very effective at thwarting assaults from within a cloud server because it cannot be fully analyzed from within. This paper's goal is to offer a fog computing-based three-layer storage structure for resolving the cloud storage issue. Frameworks like the one this study suggests can be utilized to fully utilize cloud storage while preserving user privacy. The Hash-Solomon coding technique also enables the segmentation of data. Then, to ensure privacy, a small amount of data can be stored on local computers and fog servers. The theoretical safety study and experimental assessment have demonstrated the feasibility of our proposal, which is a major advance over the existing cloud storage method. If one data component is missing, all the data information is lost. We shall demonstrate the effectiveness of the system as we secure it. Using this computational intelligence-based method, it is also possible to calculate the distribution percentage that is stored in clouds, fog, and local computers. Through theoretical safety analysis and experimental evaluation, our strategy— which represents a significant improvement over the current cloud storage strategy—has been demonstrated to be workable. If one data component is missing, all the data information is lost. Additionally, the distribution fraction saved can be determined thanks to the computational intelligence employed in this method.
APA, Harvard, Vancouver, ISO, and other styles
34

Joshi, Pratik R. "Deduplication using Cloud Computing." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (April 6, 2024): 1–5. http://dx.doi.org/10.55041/ijsrem30186.

Full text
Abstract:
There has been decreased reliance on the deployment and maintenance of local storages as the cloud infrastructure has been consistently getting improved over time. The paradigm shift in the data storage department from local storages to cloud solutions has been aggressive. This is due to the fact that the cloud solution allows for a much convenient and hassle free experience that can allow for a much better handling and perseverance of data. There are a large number of organizations that utilize these services of which large number of employees access a singular file that leads to a lot of duplicates. The duplicates can take up unnecessary space which can be problematic with limited space and expensive online storage options. Therefore, there is a need for a de duplication mechanism where the duplicates on a shared cloud storage can be eliminated to improve experience and reduce storage consumption. The proposed approach utilizes the Amazon RDS approach which achieves highly satisfactory results. Keywords: Data Deduplication; Cloud Storage, Amazon RDS. Cloud computing, cloud solution, reliability, load balancing, encryption, secure de-duplication, data integrity.
APA, Harvard, Vancouver, ISO, and other styles
35

Basry, Asril. "PENYIMPANAN DATA BERBASIS CLOUD SEBAGAI MITIGASI BENCANA KERUSAKAN DATA." Simetris : Jurnal Teknik Mesin, Elektro dan Ilmu Komputer 6, no. 2 (November 1, 2015): 249. http://dx.doi.org/10.24176/simet.v6i2.460.

Full text
Abstract:
ABSTRAK Mitigasi dalam mengurangi risiko kerusakan data dimana bencana yang dimaksud seperti terjadi kebakaran , bencana alam , perang dll sehingga dapat menyebabkan kerusakan pada infrastruktur teknologi informasi dalam hal ini adalah media penyimpanan data. Salah satu strategi yang dilakukan suatu perusahaan adalah membuat perencanaan mitigasi kerusakan dengan memanfaatkan teknologi penyimpanan data yang berbasiskan cloud. Adapun cloud storage merupakan salah satu bagian dari cloud computing yang dilakukan oleh pihak penyedia layanan ini atau internet provider. Perusahaan harus memiliki strategi penyimpanan data berbasiskan cloud dengan menyalin atau back up data kedalam cloud storage dengan diupdate atau dimutakhirkan secara berkala sehingga jika suatu kondisi terjadi bencana yang menyebabkan tidak berfungsinya fasilitas dan infrastruktur teknologi informasi dalam hal ini media penyimpanan data ( data storage ) , maka perusahan dapat melanjutkan pengolahan data dengan menggunakan data yang disimpan dalam penyimpanan data yang berbasiskan cloud, adapun dalam penyimpanan data yang berbasiskan cloud tetap menjamin terhadap keamanan dan kerahasian data perusahaan. Kata kunci: mitigasi, strategi, pemulihan, bencana, penyimpanan awan, keamanan.
APA, Harvard, Vancouver, ISO, and other styles
36

Chai, Zhi Gang, Ming Zhao, and Xiao Yu. "Based on Cloud-Technology Data Storage Security." Applied Mechanics and Materials 556-562 (May 2014): 6179–83. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.6179.

Full text
Abstract:
With the rapid development of information technology, the extensive use of cloud computing promotes technological change in the IT industry. The use of cloud storage industry is also one solution to the problem of an amount of data storing, which is traditionally large, and unimaginably redundant. The use of cloud computing in the storage system connects the user's data with network clients via the Internet. That is to say, it not only solves a lot of data storage space requirements in request, but also greatly reduces the cost of the storage system. But in the application of cloud storage, there are also many problems to be solved, even to some extent which has hindered the development of cloud storage. Among these issues, the most concerning one is cloud storage security. The following passages discuss the problem and propose a solution to it.
APA, Harvard, Vancouver, ISO, and other styles
37

Gautam, Pratiksha, Mohd Dilshad Ansari, and Surender Kumar Sharma. "Enhanced Security for Electronic Health Care Information Using Obfuscation and RSA Algorithm in Cloud Computing." International Journal of Information Security and Privacy 13, no. 1 (January 2019): 59–69. http://dx.doi.org/10.4018/ijisp.2019010105.

Full text
Abstract:
Recently, the electronic heath record (EHR) has become the chosen method to maintain a patient's health information. The advancement of cloud computing enables users to access their data with flexibility, providing large storage capability at low costs, which encourages EHR maintainers to consider shifting from their own storage to the cloud. In cloud computing, it is no doubt that securing EHRs poses a gigantic challenge. Various security properties like access control, data privacy, and scalable access between different clouds needs to be satisfied. This article presents a secure and efficient blueprint for securing data confidentiality on cloud computing storage. The proposed framework is carried out for EHR confidential data on cloud storage. Moreover, the proposed approach combines the obfuscation and RSA encryption together to enforce confidentiality and authentication. Through this framework, the data confidentiality and authentication scheme on EHR information can be enforced on clouds storage.
APA, Harvard, Vancouver, ISO, and other styles
38

Huang, Lin Na, and Feng Hua Liu. "Data Storage Technology and its Development Based on Cloud Computing." Advanced Materials Research 756-759 (September 2013): 1275–79. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1275.

Full text
Abstract:
Cloud storage of high performance is the basic condition for cloud computing. This article introduces the concept and advantage of cloud storage, discusses the infrastructure of cloud storage system as well as the architecture of cloud data storage, researches the details about the design of Distributed File System within cloud data storage, at the same time, puts forward different developing strategies for the enterprises according to the different roles that the enterprises are acting as during the developing process of cloud computing.
APA, Harvard, Vancouver, ISO, and other styles
39

kumar, Nishant. "Securely Cloud Data Storage and Sharing." Journal of Informatics Electrical and Electronics Engineering (JIEEE) 5, no. 1 (2024): 1–12. http://dx.doi.org/10.54060/jieee.2024.66.

Full text
Abstract:
With the increasing adoption of cloud computing, data storage and sharing have be-come integral parts of our digital lives. However, ensuring the security and privacy of data stored in the cloud remains a significant challenge. This paper proposes a novel approach for securely storing and sharing data in the cloud, addressing the vulnerabilities associated with traditional cloud storage models. The proposed approach utilizes advanced cryptographic techniques, including hyperchaotic encryption and hash functions, to protect the confidentiality and integrity of data stored in the cloud. The hyperchaotic encryption algorithm provides a high level of security by introducing chaos-based dynamics into the encryption process, making it resistant to various attacks. Additionally, the hash function ensures the integrity of data by generating unique identifiers for each file stored in the cloud. To enhance data sharing security, the proposed approach employs access control mechanisms and user authentication protocols. Access control rules are enforced to restrict unauthorized access to data, while user authentication ensures that only legitimate users can access and modify the shared data.
APA, Harvard, Vancouver, ISO, and other styles
40

Govinda, K., and E. Sathiyamoorthy. "Privacy Preservation of a Group and Secure Data Storage in Cloud Environment." Cybernetics and Information Technologies 15, no. 1 (March 1, 2015): 46–54. http://dx.doi.org/10.1515/cait-2015-0005.

Full text
Abstract:
Abstract Cloud computing has become a victorious archetype for data storage, as well as for computation purposes. Greater than ever it concerns user’s privacy, so that data security in a cloud is increasing day by day. Ensuring security and privacy for data organization and query dispensation in the cloud is important for superior and extended uses of cloud based technologies. Cloud users can barely have the full benefits of cloud computing if we can ensure the real user’s privacy and his data security concerns this approach along with storing thin-skinned personal information in databases and software spread around the cloud. There are numerous service suppliers in WWW (World Wide Web), who can supply each service as a cloud. These cloud services will switch over data with a supplementary cloud, so that when the data is exchanged between the clouds, the problem of confidentiality revelation exists. So the privacy revelation problem concerning a person or a corporation is unavoidably open when releasing or data distributing in the cloud service. Confidentiality is a significant issue in any cloud computing environment. In this paper we propose and implement a mechanism to maintain privacy and secure data storage for group members or a community in cloud environment.
APA, Harvard, Vancouver, ISO, and other styles
41

Chen, Hong Jun, Tao Tan, and Xue Qin Wu. "Research of Cloud Storage and Data Read-Write Technology." Applied Mechanics and Materials 347-350 (August 2013): 3555–59. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.3555.

Full text
Abstract:
Cloud storage is a promising market. In this paper, cloud storage technology and cloud data read-write technology is researched. Cloud storage has a four-layer structure model. Cloud storage uses disaster recovery and backup technology to improve the availability and reliability of the system. The request of data read-write in cloud storage is a temporary URL, which is constructed according to the algorithm. Send read-write request through push sequentially, and write by transfer between the primary chunks with the copies. The efficiency of cloud storage depends on the number of serves and clients. In order to improve the efficiency of data reading and writing, there is proposed three envisaged.
APA, Harvard, Vancouver, ISO, and other styles
42

KUMAR, Mr M. A. R., and Mrs SRILATHA PULI. "FINDING DATA DEDUPLICATION USING CLOUD." YMER Digital 21, no. 05 (May 7, 2022): 136–42. http://dx.doi.org/10.37896/ymer21.05/17.

Full text
Abstract:
Data grows at the emotional rate of 50% per time, and 75% of the digital world is a copy1 Although keeping multiple clones of data is necessary to guarantee their availability and high continuity and the quantum of data redundancy is inordinate. By keeping a single dupe of repeated data, data deduplication is one of the most promising results to reduce the storage costs, and improve users experience by saving network bandwidth and reducing provisory time. However, this result must now solve many security issues to be fully satisfying. In this project we target the attacks from malicious clients that are grounded on the manipulation of data identifiers and those based on backup time and network traffic observation. Our system provides global storage space savings, per-customer bandwidth network savings between clients and deduplication proxies, and saving global network bandwidth between deduplication proxies and the storage server. The evaluation of our result compared to a classic system shows that the overhead introduced by our scheme is mostly due to data encryption which is necessary to ensure data confidentiality. Data deduplication allows the cloud users to manage their cloud storage space for storing effectively by avoiding storage of repeated data’s and save bandwidth. Here we use the Cloud Me for the data storage. For data confidentiality the data are stored in an encrypted form using Advanced Encryption Standard (AES) algorithm.
APA, Harvard, Vancouver, ISO, and other styles
43

Mollahasani, Mahdi, Raheleh Kooshesh, and Mahdiyeh Barzegar. "Secure Cloud Data Storage Services in the Hybrid Cloud." Research Journal of Applied Sciences, Engineering and Technology 7, no. 10 (March 15, 2014): 2172–74. http://dx.doi.org/10.19026/rjaset.7.512.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Meikshan, Vladimir, and Natalia Teslya. "Selection of optimal data placement using cloud infrastructure." Proceedings of the Russian higher school Academy of sciences, no. 2 (July 21, 2021): 34–42. http://dx.doi.org/10.17212/1727-2769-2021-2-34-42.

Full text
Abstract:
Benefits of using cloud technology are obvious, their application is expanding, as a result, it determines the steady growth of demand. Cloud computing has acquired particular relevance for large companies connected with Internet services, retailing, logistics that generate large volume of business and other information. The use of cloud technologies allows organizing the joint consumption of resources, solving the problems of storing and transferring significant amounts of data. Russian consumer cooperation refers to large territory distributed organizations actively forming their own digital ecosystem. The issue of data storing and processing for consumer coo-peration organizations is very relevant. At the same time, the prices of cloud service providers are significantly different and require solving the problem of minimizing the cost of storing and transferring significant amounts of data. The application of the linear programming method is considered to select the optimal data storage scheme for several cloud service providers having different technical and economic parameters of the package (maximum amount of storage, cost of allocated resources). Mathematical model includes the equation of costs for data storing and transferring and restrictions on the amount of storage, the amount of data and its safety. Software tool that allows to perform numerical calculations is selected Microsoft Excel in combination with the "search for solutions" add-on. In accordance with the mathematical model, the conditions for minimizing the amount of cloud storage costs and the necessary restrictions are established. Initial data are set for three data forming centers, storages of certain size for five cloud service providers and nominal price for information storage and transmission. Calculations of expenses are performed in several variants: without optimization, with the solution of the optimization problem, with price increase by cloud service providers. Results of the calculations confirm the necessity to solve the problem of minimizing the cost of cloud services for corporate clients. The presented model can be expanded for any cost conditions as well as for different areas of cloud applications.
APA, Harvard, Vancouver, ISO, and other styles
45

Zeng, Wen Ying, and Yue Long Zhao. "Mobile Storage and Data Security Management Research." Applied Mechanics and Materials 325-326 (June 2013): 1661–64. http://dx.doi.org/10.4028/www.scientific.net/amm.325-326.1661.

Full text
Abstract:
The mobile storages especially in mobile devices hold a lot of important and private data. The portability and mobility may lead to loss and theft, therefore security problem of mobile storages and mobile data may suffer from troublesome and damage. TCG provides TPM for trust and security management. It is insufficient with mobile storage devices because mobile storage devices are often separated and load with heterogeneity and massive data. The paper analyzes the security management of mobile storages, proposed practical mobile storage and data security management methods and mechanisms, and illustrates mobile storages integration schemes for single storage device and multiple storages devices and cloud storage. The overall mobile storage and data security policies and methods should be performed urgently.
APA, Harvard, Vancouver, ISO, and other styles
46

Wang, Ning. "Analysis and Research of Data Security Policy Based on Cloud Storage." Advanced Materials Research 912-914 (April 2014): 1160–63. http://dx.doi.org/10.4028/www.scientific.net/amr.912-914.1160.

Full text
Abstract:
Cloud computer technology is one of current hot areas of the development of the information technology, and the data storage service based on the cloud is developing rapidly, which makes more and more enterprises and individuals enjoy the efficiency, convenience as well as low cost supplied by cloud storage. However, at the same time, the security problem of cloud storage arouses users' attention. This paper firstly expounds the basic information and system of cloud storage, then analyses the status quo of the development of cloud storage, and finally offers some preventive strategies based on cloud storage security.
APA, Harvard, Vancouver, ISO, and other styles
47

Tamrakar, Dr Ashish Kumar, Dr Abhishek Verma, Dr Vishnu Kumar Mishra, and Dr Megha Mishra. "A Study on Cloud Storage Security Method Using Data Classification." Journal of University of Shanghai for Science and Technology 23, no. 09 (September 24, 2021): 1105–21. http://dx.doi.org/10.51201/jusst/21/09657.

Full text
Abstract:
Cloud computing is a new model for providing diverse services of software and hardware. This paradigm refers to a model for enabling on-demand network access to a shared pool of configurable computing resources, that can be rapidly provisioned and released with minimal service provider interaction .It helps the organizations and individuals deploy IT resources at a reduced total cost. However, the new approaches introduced by the clouds, related to computation outsourcing, distributed resources and multi-tenancy concept, increase the security and privacy concerns and challenges. It allows users to store their data remotely and then access to them at any time from any place .Cloud storage services are used to store data in ways that are considered cost saving and easy to use. In cloud storage, data are stored on remote servers that are not physically known by the consumer. Thus, users fear from uploading their private and confidential files to cloud storage due to security concerns. The usual solution to secure data is data encryption, which makes cloud users more satisfied when using cloud storage to store their data. Motivated by the above facts; we have proposed a solution to undertake the problem of cloud storage security. In cloud storage, there are public data that do not need any security measures, and there are sensitive data that need applying security mechanisms to keep them safe. In that context, data classification appears as the solution to this problem. The classification of data into classes, with different security requirements for each class is the best way to avoid under security and over security situation. The existing cloud storage systems use the same Journal of University of Shanghai for Science and Technology ISSN: 1007-6735 Volume 23, Issue 9, September – 2021 Page-1105 key size to encrypt all data without taking into consideration its confidentiality level. Treating the low and high confidential data with the same way and at the same security level will add unnecessary overhead and increase the processing time. In our proposal, we have combined the K-NN (K Nearest Neighbors) machine learning method and the goal programming decision-making method, to provide an efficient method for data classification. This method allows data classification according to the data owner security needs. Then, we introduce the user data to the suitable security mechanisms for each class. The use of our solution in cloud storage systems makes the data security process more flexible, besides; it increases the cloud storage system performance and decreases the needed resources, which are used to store the data.
APA, Harvard, Vancouver, ISO, and other styles
48

Fanglin An, Fanglin An, Jun Ye Fanglin An, and Zhen Guo Jun Ye. "A New Data Integrity Verification Scheme with Low Communication Cost." 網際網路技術學刊 24, no. 2 (March 2023): 283–90. http://dx.doi.org/10.53106/160792642023032402007.

Full text
Abstract:
<p>The development of cloud storage is indispensable for today’s Internet information technology. The superiority of cloud storage is that the ownership of the storage medium and the ownership of the stored data are divided and held by two parties with respective interests - cloud server providers and data users. However, the transmission, storage and utilization of data constantly caused the violation of users&rsquo; rights and interests. Data integrity as a countermeasure has been paid growing attention to by researchers. Traditional data integrity protection schemes are based on the cloud server-client architecture, which requires high computational overhead and communication. To address this scenario, this paper proposes an improved data integrity verification scheme that enables local users to perform rapid and efficient data integrity verification of data stored on cloud servers, reduces the volume of communication data during the verification process, and effectively prevents the loss or tampering of data stored in the cloud server.</p> <p>&nbsp;</p>
APA, Harvard, Vancouver, ISO, and other styles
49

Pajany M. and Zayaraz G. "A Robust Lightweight Data Security Model for Cloud Data Access and Storage." International Journal of Information Technology and Web Engineering 16, no. 3 (July 2021): 39–53. http://dx.doi.org/10.4018/ijitwe.2021070103.

Full text
Abstract:
In this paper, an efficient lightweight cloud-based data security model (LCDS) is proposed for building a secured cloud database with the assistance of intelligent rules, data storage, information collection, and security techniques. The major intention of this study is to introduce a new encryption algorithm to secure intellectual data, proposing a new data aggregation algorithm for effective data storage and improved security, developing an intelligent data merging algorithm for accessing encrypted and original datasets. The major benefit of the proposed model is that it is fast in the encryption process at the time of data storage and reduced decryption time during data retrieval. In this work, the authors proposed an enhanced version of the hybrid crypto algorithm (HCA) for cloud data access and storage. The proposed system provides secured storage for storing data within the cloud.
APA, Harvard, Vancouver, ISO, and other styles
50

Umair Waqas. "ARCPS - Anti-Redundant Cloud & Public Storage Moving towards Intelligent Cloud." Lahore Garrison University Research Journal of Computer Science and Information Technology 1, no. 3 (September 30, 2017): 26–36. http://dx.doi.org/10.54692/lgurjcsit.2017.010320.

Full text
Abstract:
Clouds are the future and powerful source in almost every aspect of computing. They offer many services running to facilitate users at same time. Cloud infrastructure is made up with a number of resourceful systems connected each other and to the internet. This paper is about (STaaS) Storage as a service but we are looking as a cloud storage provider, how to improve user experience and cloud storage efficiency by de-duplication of data. Cloud storage is unlimited but practically everything has a limit, so storage is also limited but the data storage demand is increasing with every next day. Everyone wants reliable and secure storage to store all of his data. Storage space is a need for everyone, and it’s mostly beneficial to those people who want a shared space or they want to share data online with others with minimal efforts. So, this paper describes a technique in which cloud providers can save a lot of storage space by eradicating duplication and this will be an automatic and runtime process. By monitoring and analyzing the semantics of data through different channels like DBpedia, WordNet etc. Data will be categorized accordingly and among these categories, checking of duplication performed and removed if found. Different file formats can have different techniques for processing. We are mainly focusing on the public cloud.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography