To see the other types of publications on this topic, follow the link: Cloud storage, availability.

Journal articles on the topic 'Cloud storage, availability'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cloud storage, availability.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

K. Sunitha, K. Sunitha, V. Tejaswini V. Tejaswini, and S. K. Prashanth S.K. Prashanth. "Ensuring Availability and Integrity of Data Storage in Cloud Computing." Paripex - Indian Journal Of Research 2, no. 2 (2012): 119–22. http://dx.doi.org/10.15373/22501991/feb2013/40.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wu, Suzhen, Kuan-Ching Li, Bo Mao, and Minghong Liao. "DAC: Improving storage availability with Deduplication-Assisted Cloud-of-Clouds." Future Generation Computer Systems 74 (September 2017): 190–98. http://dx.doi.org/10.1016/j.future.2016.02.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Prabu, Arjunan. "High Availability Architectures in Cloud Storage Systems: A Comprehensive Analysis." International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences 8, no. 3 (2020): 1–4. https://doi.org/10.5281/zenodo.14508530.

Full text
Abstract:
This paper aims at discussing the various high availability architectures that are used in cloud based storage systems especially in large enterprises. This paper therefore focuses on the current trends that are making organizations shift most of their critical applications and processes to the cloud, thus highlighting the importance of highly available storage systems. In this paper we discuss the architectural designs, redundancy techniques and the operational factors that are involved in order to design  cloud storage systems that are highly available and yet highly performant. Based o
APA, Harvard, Vancouver, ISO, and other styles
4

Prabowo, Hari Yudho, Aan Restu Mukti, Suryayusra, and Tamsir Ariyadi. "Analisa Desain High Availability dan Uji Reabilitas Cloud Storage." Jurnal Indonesia : Manajemen Informatika dan Komunikasi 5, no. 1 (2024): 262–70. http://dx.doi.org/10.35870/jimik.v5i1.467.

Full text
Abstract:
The growth of the Internet has brought about significant changes in how we store data. Common data storage media include hard disks, flash drives, and CDs. With the advancement of technology, cloud storage has emerged as a new alternative in the world of storage. In this regard, two leading cloud storage platforms, Owncloud and Nextcloud, have evolved into popular options. The purpose of this research is to evaluate the level of High Availability and reliability of Owncloud and Nextcloud cloud storage platforms. This is accomplished by conducting load testing and simulating failure scenarios t
APA, Harvard, Vancouver, ISO, and other styles
5

Li, Jun, and Mengshu Hou. "Improving Data Availability for Deduplication in Cloud Storage." International Journal of Grid and High Performance Computing 10, no. 2 (2018): 70–89. http://dx.doi.org/10.4018/ijghpc.2018040106.

Full text
Abstract:
This article describes how in order to reduce the amount of data, deduplication technology is introduced in the cloud storage. Adopting this technology, the duplicated data can be eliminated, users can conserve the storage requirement. However, deduplication technology also increases the data unavailability. To solve this problem, the authors propose a method to improve data availability in the deduplication storage system. It is based on the data chunk reference count and access frequency, and increases redundant information for the data chunks, to ensure data availability and minimize storag
APA, Harvard, Vancouver, ISO, and other styles
6

Ar-Razy, Ikhwan, Rinta Kridalukmana, and Eko Didik Widianto. "Implementasi Cloud Storage Menggunakan OwnCloud yang High-Availability." Jurnal Teknologi dan Sistem Komputer 4, no. 2 (2016): 209. http://dx.doi.org/10.14710/jtsiskom.4.2.2016.209-214.

Full text
Abstract:
Implementation of practicum courses in Department of Computer Engineering Diponegoro University has some drawbacks, one of them is a lot of lab assistant and the practitioner experiencing difficulties in terms of archiving. One solution to solve the problem is implementing a shared file storage system that is easy and can be accessed by both practitioners or lab assistants. The purpose of this research is to build a cloud-based storage systems that are reliable to preventing crash damage hardware and high availability. The purpose of this research is achieved by designing the appropriate metho
APA, Harvard, Vancouver, ISO, and other styles
7

He, Zhong Lin, Yu Hua He, and Li Yu Chen. "A Study on the Key Issues of Cloud Storage Technology." Applied Mechanics and Materials 29-32 (August 2010): 1122–26. http://dx.doi.org/10.4028/www.scientific.net/amm.29-32.1122.

Full text
Abstract:
The rapid growth of mass data presents a huge demand for storage systems, thus, cloud storage technology is emerging. This paper briefly describes the concept of cloud storage. Combined with the high-performance requirements, the availability, reliability, security and scalability of cloud storage, it focuses on analyzing such key issues of cloud storage like the structure of cloud storage systems, public and private cloud, data types in cloud storage, internal technical resources and the prerequisite for development of cloud storage technologies, at the same time, it makes a conjecture on the
APA, Harvard, Vancouver, ISO, and other styles
8

Liang, Xiao Yang, and Lin Zhang. "Cloud Storage and Security Technology in the Application of the Internet Things." Applied Mechanics and Materials 533 (February 2014): 460–65. http://dx.doi.org/10.4028/www.scientific.net/amm.533.460.

Full text
Abstract:
This paper proceeds as follow, the architecture model based on cloud storage and cloud storage of key technologies, from the availability, reliability and data sharing three aspects analysis the feasibility of the combination of cloud storage and Internet of things, cloud storage are discussed under the Internet environment facing security problems and the corresponding solutions and Internet of things under the environment of cloud storage platform structure model, and the cloud storage in the Internet of the future development trend is prospected.
APA, Harvard, Vancouver, ISO, and other styles
9

Cost, efficient, V. Narasimha Prasad L, and Naveen Kumar D. "Intelligent Hybrid Cloud Data Hosting Services with Effective Cost and High Availability." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 4 (2017): 2176–82. https://doi.org/10.11591/ijece.v7i4.pp2176-2182.

Full text
Abstract:
In this Paper the major concentration is an efficient and user based data hosting service for hybrid cloud. It provides friendly transaction scheme with the features of cost effective and high availability to all users. This framework intelligently puts data into cloud with effective cost and high availability. This gives a plan of proof of information respectability in which the client has utilize to check the rightness of his information. In this study the major cloud storage vendors in India are considered and the parameters like storage space, cost of storage, outgoing bandwidth and type o
APA, Harvard, Vancouver, ISO, and other styles
10

Cui, Min, and Yipeng Wang. "EC-Kad: An Efficient Data Redundancy Scheme for Cloud Storage." Electronics 14, no. 9 (2025): 1700. https://doi.org/10.3390/electronics14091700.

Full text
Abstract:
To address the issues of fault tolerance and retrieval efficiency in cloud storage space data, we propose an efficient cloud storage solution based on erasure codes. A cloud storage system model is designed to use erasure codes to distribute the encoded original data files across various nodes of the cloud storage system in a decentralized manner. The files are decoded by the receiver to complete data recovery and ensure high availability of the data files while optimizing redundant computing overhead during data storage, thereby improving the stability of encoding and decoding and reducing th
APA, Harvard, Vancouver, ISO, and other styles
11

Myneni, Madhu Bala, L. V. Narasimha Prasad, and D. Naveen Kumar. "Intelligent Hybrid Cloud Data Hosting Services with Effective Cost and High Availability." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 4 (2017): 2176. http://dx.doi.org/10.11591/ijece.v7i4.pp2176-2182.

Full text
Abstract:
<p>In this Paper the major concentration is an efficient and user based data hosting service for hybrid cloud. It provides friendly transaction scheme with the features of cost effective and high availability to all users. This framework intelligently puts data into cloud with effective cost and high availability. This gives a plan of proof of information respectability in which the client has utilize to check the rightness of his information. In this study the major cloud storage vendors in India are considered and the parameters like storage space, cost of storage, outgoing bandwidth a
APA, Harvard, Vancouver, ISO, and other styles
12

Rakesh, S., and Somsagar Sarfarazahmed. "Attribute-Based Encryption for Cloud IOT With Accountability and Privacy Protection." Advancement and Research in Instrumentation Engineering 6, no. 2 (2023): 36–41. https://doi.org/10.5281/zenodo.8210458.

Full text
Abstract:
<em>In this paper, we introduce a novel &quot;CHARM&quot; heterogeneous multi-cloud solution to cost-effective data hosting with high availability. It intelligently distributes data over various clouds with no financial expenditure and guaranteed availability. We explicitly incorporate the two widely used redundancy mechanisms, replication and erasure coding, into a coherent model to provide the required availability in the presence of diverse data access patterns. The optimal data storage choices (including clouds and redundancy systems) are then chosen using a robust heuristic-based approach
APA, Harvard, Vancouver, ISO, and other styles
13

Wijaya, Miftakhudin Kusuma, Zamah Sari, and Mahar Faiqurahman. "Implementasi High Availability Cloud Storage Dengan Metode Replikasi dan Failover Pada Laboratorium Teknik Informatika." Jurnal Repositor 2, no. 2 (2020): 165. http://dx.doi.org/10.22219/repositor.v2i2.245.

Full text
Abstract:
ABSTRAKCloud storage merupakan salah satu bentuk dari cloud computing yang terpusat pada media penyimpanan data. Dalam cloud storage ada kemungkinan yang di alami seperti kehilangan data dengan sekala kecil maupun besar, ataupun tidak dapat di akses sama sekali. Kesalahan yang terjadi akibat bencana alam, kesalahan manusia, ataupun alat yang cukup usang. Dari permasalahan tersebut di lakukan backup dan sinkronisasi data untuk menanggulangi permasalahan yang ada. Replikasi adalah proses yang di gunakan untuk menyalin atau mendistribusikan data dari penyedia layanan ke perangkat backup. Replikas
APA, Harvard, Vancouver, ISO, and other styles
14

Sun, Xinwei, and Zhang Wei. "The Dynamic Data Privacy Protection Strategy Based on the CAP Theory." International Journal of Interdisciplinary Telecommunications and Networking 7, no. 1 (2015): 44–56. http://dx.doi.org/10.4018/ijitn.2015010104.

Full text
Abstract:
With the rapid development of cloud storage technology, the cloud storage platform has gradually been used to store data. However, the privacy protection strategy provided by public cloud storage platform is hard to be trust by users. Moreover, they are unable to customize their own storage strategy according to their demands. This study proposed a consistency-availability-partition tolerance (CAP) theory -based data privacy protection strategy, which firstly employed CAP theory to provide privacy data protection for users and then offer users with choice to select corresponding privacy strate
APA, Harvard, Vancouver, ISO, and other styles
15

Watane, Hemant N., Sundaranarayana D, Sunitha M, Bala Krishna Reddy V, Mohit Tiwari, and Edwin Prabhakar P B. "Secure Multi-Cloud Storage Systems Techniques for Data Integrity and Availability." ITM Web of Conferences 76 (2025): 03008. https://doi.org/10.1051/itmconf/20257603008.

Full text
Abstract:
Cloud computing is constantly changing, and the provision of efficient and safe data management has led to a prominent challenge in the virtualization age - security for multi-cloud storage systems. This study provides a holistic way to solve the problems of data security and accessibility in multiple cloud environments. The paper identifies scalable and cost-saving solutions, which promise to make sure data are secure from attacks while also being readable across cloud service providers, reducing the problems of vendor lock-in, latency, and expense. As a solution to mitigating the risk of dat
APA, Harvard, Vancouver, ISO, and other styles
16

Muhammad Usman Ashraf. "A Survey on Data Security in Cloud Computing Using Blockchain: Challenges, Existing-State-Of-The-Art Methods, And Future Directions." Lahore Garrison University Research Journal of Computer Science and Information Technology 5, no. 3 (2021): 15–30. http://dx.doi.org/10.54692/lgurjcsit.2021.0503213.

Full text
Abstract:
Cloud computing is one of the ruling storage solutions. However, the cloud computing centralized storage method is not stable. Blockchain, on the other hand, is a decentralized cloud storage system that ensures data security. Cloud environments are vulnerable to several attacks which compromise the basic confidentiality, integrity, availability, and security of the network. This research focus on decentralized, safe data storage, high data availability, and effective use of storage resources. To properly respond to the situation of the blockchain method, we have conducted a comprehensive surve
APA, Harvard, Vancouver, ISO, and other styles
17

OKI, Eiji, Ryoma KANEKO, Nattapong KITSUWAN, Takashi KURIMOTO, and Shigeo URUSHIDANI. "Cloud Provider Selection Models for Cloud Storage Services to Satisfy Availability Requirements." IEICE Transactions on Communications E100.B, no. 8 (2017): 1406–18. http://dx.doi.org/10.1587/transcom.2016ebp3403.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Idrus, Ali. "Designing High Availability Cluster Using Server Virtualization on Cloud Storage Services." IJISTECH (International Journal of Information System & Technology) 5, no. 2 (2021): 93. http://dx.doi.org/10.30645/ijistech.v5i2.119.

Full text
Abstract:
Cloud Storage Service at PT. Harrisma Globaltechnologies Jakarta has not been applied based on virtualization. The problem with cloud storage services in general is that the server is not able to serve a high number of requests as a result the cloud storage server fails. One of these problems is caused by inadequate server resources and less than optimal storage server management. These problems can be solved effectively and efficiently with server virtualization. Where server virtualization is managed by Proxmox. Proxmox is an open-source virtualization platform supported by KVM and OpenVZ hy
APA, Harvard, Vancouver, ISO, and other styles
19

Ibtihal, Mouhib, El Ouadghiri Driss, and Naanani Hassan. "Homomorphic Encryption as a Service for Outsourced Images in Mobile Cloud Computing Environment." International Journal of Cloud Applications and Computing 7, no. 2 (2017): 27–40. http://dx.doi.org/10.4018/ijcac.2017040103.

Full text
Abstract:
The integration of cloud computing with mobile computing and internet has given birth to mobile cloud computing. This technology offers many advantages to users, like Storage capacity, Reliability, Scalability and Real time data availability. Therefore, it is s increasing fast and it is inevitably integrated into everyday life. In MCC, data processing and data storage can be migrated into the cloud servers. However, the confidentiality of images and data is most important in today's environment. In this paper, we mainly focus on secure outsourcing of images. For this purpose, we propose a secu
APA, Harvard, Vancouver, ISO, and other styles
20

Ahmed Ibrahim Turki and Qasim Mohammed Hussein. "Solutions of diagnosis of security issues and attacks for storage in cloud computing." Tikrit Journal of Pure Science 23, no. 4 (2018): 118–23. http://dx.doi.org/10.25130/tjps.v23i4.532.

Full text
Abstract:
Cloud computing is technique cost-effective, flexible, and convenient in remote access to applications and storage services, making it easy to provide information technology services and business across the Internet. Nevertheless, the use of cloud computing is an additional source of security risk due to third-party outsourcing, as makes maintaining the privacy, availability and security of data is very difficult. Cloud computing has many of its supporting technologies (virtualization, Web 2.0, service-oriented architecture), which inherits many security issues and makes them susceptible to at
APA, Harvard, Vancouver, ISO, and other styles
21

Chen, Hong Jun, Tao Tan, and Xue Qin Wu. "Research of Cloud Storage and Data Read-Write Technology." Applied Mechanics and Materials 347-350 (August 2013): 3555–59. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.3555.

Full text
Abstract:
Cloud storage is a promising market. In this paper, cloud storage technology and cloud data read-write technology is researched. Cloud storage has a four-layer structure model. Cloud storage uses disaster recovery and backup technology to improve the availability and reliability of the system. The request of data read-write in cloud storage is a temporary URL, which is constructed according to the algorithm. Send read-write request through push sequentially, and write by transfer between the primary chunks with the copies. The efficiency of cloud storage depends on the number of serves and cli
APA, Harvard, Vancouver, ISO, and other styles
22

Si, Hai Ping, and Yang Qiao. "Internal Cloud Storage Architecture Implemented in Crop Germplasm Resources Data." Advanced Materials Research 748 (August 2013): 1059–64. http://dx.doi.org/10.4028/www.scientific.net/amr.748.1059.

Full text
Abstract:
At the rate data related to crop germplasm resources is growing rapidly, it's not surprising that the study of new storage technology is also growing in popularity. Cloud storage, due to its own advantages including cost, frequency of access, protection, and availability, has been one of the hot buzzwords of the past couple of years. Based on the analysis of the definition and characters of cloud storage, and combined with the characteristics of crop germplasm resources data and databases, this paper discussed the internal cloud storage architecture for crop germplasm resources data, detailed
APA, Harvard, Vancouver, ISO, and other styles
23

Deineka, O. R. "ANALYSIS OF CURRENT TRENDS AND APPROACHES TO RELIABLE AND SECURE BIG DATA STORAGE." Computer systems and network 7, no. 1 (2025): 106–18. https://doi.org/10.23939/csn2025.01.106.

Full text
Abstract:
The rapid accumulation of information assets requires new approaches to their storage and protection. The article is devoted to the analysis of modern approaches to storing large volumes of data, taking into account their efficiency, reliability and security. Key technologies such as cloud platforms, local solutions and distributed storage systems are considered, as well as the features of their application. The study emphasizes the role of cloud technologies as a basis for storing and processing big data, ensuring scalability, flexibility and high availability. The challenges associated with
APA, Harvard, Vancouver, ISO, and other styles
24

Bhargavi, Patel. "Enhancing Availability of Data in Mixed Homomorphic Encryption in Cloud." International Journal of Trend in Scientific Research and Development 3, no. 4 (2019): 1310–14. https://doi.org/10.5281/zenodo.3591017.

Full text
Abstract:
In Forthcoming times of information technology companies, cloud computing updated as the structural model. There are so many benefits of cloud computing in technical as well as in organization. But still there are many new objections will carried in cloud computing for example in data security in cloud storage. There are many approaches available for data security in cloud storage like encryption with obfuscation technique, watermark security, data partitioning technique. In above all the approaches, there is no possibility that cloud data centers are operate computation on encrypted data so e
APA, Harvard, Vancouver, ISO, and other styles
25

Mrs., Snehal A.Narale*1 &. Dr.P.K.Butey2. "PERFORMANCE ANALYSIS OF QOS USING DATA DISTRIBUTION TECHNIQUES IN CLOUD COMPUTING." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES [NC-Rase 18] (November 12, 2018): 31–38. https://doi.org/10.5281/zenodo.1483972.

Full text
Abstract:
The biggest challenge in cloud data storage is customer&rsquo;s outsourced data. When the storage is outsourced in that case customer is depends only on single service provider and that fashion is not very much hopeful. Privacy and availability of data from cloud data storage is another issue of cloud computing. To overcome this problem to offer better privacy as well as reliability of cloud data can be accomplished by using data distribution techniques. In cloud computing to achieve data privacy the users&rsquo; data is divided into no of pieces and distributed among the available service pro
APA, Harvard, Vancouver, ISO, and other styles
26

Julia, Myint1 and Thinn Thu Naing2. "MANAGEMENT OF DATA REPLICATION FOR PC CLUSTER BASED CLOUD STORAGE SYSTEM." International Journal on Cloud Computing: Services and Architecture(IJCCSA) 1, November (2018): 01–11. https://doi.org/10.5281/zenodo.1449827.

Full text
Abstract:
Storage systems are essential building blocks for cloud computing infrastructures. Although high performance storage servers are the ultimate solution for cloud storage, the implementation of inexpensive storage system remains an open issue. To address this problem, the efficient cloud storage system is implemented with inexpensive and commodity computer nodes that are organized into PC cluster based datacenter. Hadoop Distributed File System (HDFS) is an open source cloud based storage platform and designed to be deployed in low-cost hardware. PC Cluster based Cloud Storage System is implemen
APA, Harvard, Vancouver, ISO, and other styles
27

Ramesh Naidu, P., N. Guruprasad, and V. Dankan Gowda. "A High-Availability and Integrity Layer for Cloud Storage, Cloud Computing Security: From Single to Multi-Clouds." Journal of Physics: Conference Series 1921 (May 2021): 012072. http://dx.doi.org/10.1088/1742-6596/1921/1/012072.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Chansaeng, Tanagrit, and Chaiyaporn Khemapatapan. "Enhancing Multi-Cloud Storage: A Hybrid Framework Using Interleaving and LT Codes." Journal of Current Science and Technology 14, no. 3 (2024): 69. http://dx.doi.org/10.59796/jcst.v14n2.2024.69.

Full text
Abstract:
This article presents a novel framework for enhancing the integrity and availability of data stored on multi-cloud storage systems. The proposed technique leverages a combination of interleaving and Luby transform (LT) codes, specifically employing either ideal or robust soliton distribution during the LT encoding stage. The proposed technique is rigorously designed, incorporating data preparation facilitated by a cloud broker and culminating in the measurement of key performance indicators (KPIs). A central component of the framework is data processing, which involves interleaving followed by
APA, Harvard, Vancouver, ISO, and other styles
29

Ratnangi, Nirek. "Impact of Storage Solutions on Linux Pacemaker Cluster Performance in Critical Business Operations in cloud." Journal of Scientific and Engineering Research 10, no. 9 (2023): 254–66. https://doi.org/10.5281/zenodo.13918931.

Full text
Abstract:
In modern cloud environments, ensuring high availability (HA) is crucial for maintaining the continuity of critical business operations. Linux Pacemaker, a leading HA cluster manager, plays a pivotal role in orchestrating redundancy and failover mechanisms for essential services. One often overlooked factor in achieving optimal performance of these clusters is the choice of storage solutions. This paper investigates the impact of various storage solutions, such as Network-Attached Storage (NAS), Storage Area Network (SAN), and cloud-native storage, on the performance of Linux Pacemaker cluster
APA, Harvard, Vancouver, ISO, and other styles
30

B, Shadaksharappa. "High Availability and Fault Tolerance in AWS." International Journal of Innovative Research in Information Security 09, no. 03 (2023): 66–72. http://dx.doi.org/10.26562/ijiris.2023.v0903.03.

Full text
Abstract:
With the increasing adoption of cloud computing, ensuring high availability and fault tolerance has become paramount for organizations. Amazon Web Services (AWS) offers a robust infrastructure for hosting applications, but it requires careful architectural design and implementation to achieve desired levels of availability and fault tolerance. This research paper explores two innovative concepts, namely Cloud Fractal and Decentralized Replication and Orchestration, and their application in achieving high availability and fault tolerance in AWS. We present a comprehensive analysis of these conc
APA, Harvard, Vancouver, ISO, and other styles
31

Shi, Junjie, Jing Du, Yingwen Ren, Boyu Li, Jinwei Zou, and Anyi Zhang. "Convolution-LSTM-Based Mechanical Hard Disk Failure Prediction by Sensoring S.M.A.R.T. Indicators." Journal of Sensors 2022 (October 4, 2022): 1–15. http://dx.doi.org/10.1155/2022/7832117.

Full text
Abstract:
The traditional Infrastructure as a Service (IaaS) cloud platform tends to realize high data availability by introducing dedicated storage devices. However, this heterogeneous architecture has high maintenance cost and might reduce the performance of virtual machines. In homogeneous IaaS cloud platform, servers in the platform would uniformly provide computing resources and storage resources, which effectively solve the above problems, although corresponding mechanisms need to be introduced to improve data availability. Efficient storage resource availability management is one of the key metho
APA, Harvard, Vancouver, ISO, and other styles
32

Shalom, G. Richa, and Ganesh Rohit Nirogi. "Decentralized Cloud Storage Using Blockchain." International Journal for Research in Applied Science and Engineering Technology 10, no. 9 (2022): 1294–300. http://dx.doi.org/10.22214/ijraset.2022.46810.

Full text
Abstract:
Abstract: Because of its accessibility and ease of use, cloud storage has become the most widely used type of storage on the market in recent years. However, the privacy and data security of cloud storage are at risk. The protection of data security and privacy is the main topic of this essay. We suggest a blockchain-based decentralised storage system. Since blockchain is a distributed peer-to-peer system, any processing node connected to the internet can join and build peers' networks, maximising resource usage. Blockchain protects data security. The user's file is encrypted and shared among
APA, Harvard, Vancouver, ISO, and other styles
33

Xu, Ronghua, Yu Chen, Genshe Chen, and Erik Blasch. "SAUSA: Securing Access, Usage, and Storage of 3D Point CloudData by a Blockchain-Based Authentication Network." Future Internet 14, no. 12 (2022): 354. http://dx.doi.org/10.3390/fi14120354.

Full text
Abstract:
The rapid development of three-dimensional (3D) acquisition technology based on 3D sensors provides a large volume of data, which are often represented in the form of point clouds. Point cloud representation can preserve the original geometric information along with associated attributes in a 3D space. Therefore, it has been widely adopted in many scene-understanding-related applications such as virtual reality (VR) and autonomous driving. However, the massive amount of point cloud data aggregated from distributed 3D sensors also poses challenges for secure data collection, management, storage
APA, Harvard, Vancouver, ISO, and other styles
34

Gouru, Navya, and NagaLakshmi Vadlamani. "CoPS - Cooperative Provenance System with ZKP using Ethereum Blockchain Smart Contracts." International Journal of Distributed Systems and Technologies 9, no. 4 (2018): 40–53. http://dx.doi.org/10.4018/ijdst.2018100103.

Full text
Abstract:
The redesign of cloud storage with the amalgamation of cooperative cloud and an immutable and unhackable distributed database blockchain thrives towards a strong CIA triad and secured data provenance. The conspiracy ideology associated with the traditional cloud has economized with cooperative cloud storage like Storj and Sia, decentralized storage, which allows renting the unused hard drive space and getting monetary compensation in an exchange with cryptocurrency. In this article, the authors explain how confidentiality, integrity and availability can be progressed with cooperative cloud sto
APA, Harvard, Vancouver, ISO, and other styles
35

Taha, Hatem, Noura Aknin, and Kamal Eddin El kadiri. "A Novel Model of Data Storage Service in the Architecture Cloud Storage." International Journal of Online and Biomedical Engineering (iJOE) 15, no. 07 (2019): 66. http://dx.doi.org/10.3991/ijoe.v15i07.10094.

Full text
Abstract:
Cloud storage is the lower layer of the cloud computing system that supports other layers above it. Up to now the likes of Google, Microsoft, IBM, Amazon have been providing cloud storage services. Since it’s efficient way to store and manage important data, the offer of free storage attracts researchers. As a result, cloud storage research will not only track trends, but will also have high application value. Therefore, this paper, introduces a novel model of data storage and backup in cloud storage, that optimally combines customer storage resources with service providers, so that redundancy
APA, Harvard, Vancouver, ISO, and other styles
36

Gousteris, Solonas, Yoannis C. Stamatiou, Constantinos Halkiopoulos, Hera Antonopoulou, and Nikos Kostopoulos. "Secure Distributed Cloud Storage based on the Blockchain Technology and Smart Contracts." Emerging Science Journal 7, no. 2 (2023): 469–79. http://dx.doi.org/10.28991/esj-2023-07-02-012.

Full text
Abstract:
Objectives: This paper addresses the problem of secure data storage and sharing over cloud storage infrastructures. A secure, distributed cloud storage structure incorporating the blockchain structure is proposed that supports confidentiality, integrity, and availability. Methods/Analysis: The proposed structure combines two well-known technologies: one of them is the Ethereum Blockchain and its Smart Contracts and the other is the RSA encryption and authentication scheme. The Ethereum Blockchain is used as a data structure, which ensures data availability and integrity while RSA provides sens
APA, Harvard, Vancouver, ISO, and other styles
37

Rishabh, Mudgal*1 &. Mrs. Kirti Bhatia2. "ENHANCING DATA SECURITY USING ENCRYPTION AND SPLITTING TECHNIQUE OVER MULTI-CLOUD ENVIRONMENT." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 7, no. 8 (2018): 440–49. https://doi.org/10.5281/zenodo.1345684.

Full text
Abstract:
Now days cloud computing become one of the main topic of IT and main point is cloud data storage security. Cloud computing is the fastest growing technology. This technology provides access to many different applications. Cloud computing is used as data storage so data security and privacy issues such as confidentiality, availability and integrity are important factor associated with it. Cloud storage provides user to access remotely store their data so it becomes necessary to protect data from unauthorized access, hackers or any type of modification and malicious behavior. Security is an impo
APA, Harvard, Vancouver, ISO, and other styles
38

Zhou, Li, Chi Dong, Xindong You, Jie Huang, and Congfeng Jiang. "High Availability Green Gear-shifting Mechanism in Cloud Storage System." International Journal of Grid and Distributed Computing 8, no. 5 (2015): 303–14. http://dx.doi.org/10.14257/ijgdc.2015.8.5.30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Tang, Yu, Hailong Sun, Xu Wang, and Xudong Liu. "Achieving convergent causal consistency and high availability for cloud storage." Future Generation Computer Systems 74 (September 2017): 20–31. http://dx.doi.org/10.1016/j.future.2017.04.016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Yang, Jing Bo, Shu Huang, and Pan Jiang. "Research on Distributed Heterogeneous Data Storage Algorithm in Cloud Computing Data Center." Applied Mechanics and Materials 624 (August 2014): 553–56. http://dx.doi.org/10.4028/www.scientific.net/amm.624.553.

Full text
Abstract:
With the development of cloud computing, data center is also improved. cloud computing data center contains hundreds, even million of servers or PCs. It has many heterogeneous resources. Data center is a key to promise high scalability and resource usage of cloud computing. In addition, replica is introduced into data center, which is an important method to improve availability and performance. In this paper, the research on distributed storage algorithm based on the cloud computing. This algorithm uses the design of system storage level indicators within classification of massive data storage
APA, Harvard, Vancouver, ISO, and other styles
41

Ojha, Pranav. "Enhanced Cloud Computing Security Based on Single to Multi Cloud Systems." Journal of Research in Science and Engineering 6, no. 8 (2024): 52–56. http://dx.doi.org/10.53469/jrse.2024.06(08).12.

Full text
Abstract:
Cloud computing has increased rapidly in many organizations and then it's utilized. Cloud computing provides safe data. Cloud computing provides many advantages in terms of low cost and accessibility of data. Ensuring the security of cloud computing is a major factor in the cloud computing environment, as users often store sensitive information with cloud storage providers but these providers may be untrusted. Dealing with "single cloud" providers is predicted to become less popular with customers due to risks of service availability failure and the possibility of malicious insiders in the sin
APA, Harvard, Vancouver, ISO, and other styles
42

Gururaj, H. L. "A comprehensive analysis of security challenges in mobile cloud computing." i-manager’s Journal on Cloud Computing 10, no. 2 (2023): 35. http://dx.doi.org/10.26634/jcc.10.2.20419.

Full text
Abstract:
The computing capability of mobile systems is enhanced by cloud computing. Mobile devices can rely on cloud computing to perform computationally intensive operations such as data mining and searching. Mobile cloud computing refers to the availability of cloud computing services in a mobile environment. It is a combination of mobile networks and cloud computing, providing optimal services for mobile users. The use of mobile cloud computing overcomes performance-related obstacles, such as bandwidth, storage capacity, and battery life, as well as environment-related issues like availability, scal
APA, Harvard, Vancouver, ISO, and other styles
43

Akherfi, Khadija, Hamid Harroud, and Michael Gerndt. "A Mobile Cloud Middleware to Support Mobility and Cloud Interoperability." International Journal of Adaptive, Resilient and Autonomic Systems 7, no. 1 (2016): 41–58. http://dx.doi.org/10.4018/ijaras.2016010103.

Full text
Abstract:
With the recent advances in cloud computing and the improvement in the capabilities of mobile devices in terms of speed, storage, and computing power, Mobile Cloud Computing (MCC) is emerging as one of important branches of cloud computing. MCC is an extension of cloud computing with the support of mobility. In this paper, the authors first present the specific concerns and key challenges in mobile cloud computing. They then discuss the different approaches to tackle the main issues in MCC that have been introduced so far, and finally focus on describing the proposed overall architecture of a
APA, Harvard, Vancouver, ISO, and other styles
44

DINESH, N.THILLAI, and A.SELVA DEVI. "SECURED MULTI-TENANCY APPROVAL FOR DATA STORAGE IN CLOUD." COMPUSOFT: An International Journal of Advanced Computer Technology 04, no. 06 (2015): 1837–40. https://doi.org/10.5281/zenodo.14786032.

Full text
Abstract:
Cloud Computing is a general term for delivery of hosted services over the internet. Cloud organization and institutions are increasingly driven to cloud computing as a way to increase functionality, lower cost and enhance convenience to user by making the service and resource availability anywhere there is an internet connection. With cloud computing, user have readily available a suite of application, feature, and infrastructure that would normally require significant investment if provide in the traditional in house computing environment.&nbsp;
APA, Harvard, Vancouver, ISO, and other styles
45

Vithya Vijayalakshmi, A., N. Veeraragavan, and L. Arockiam. "A Unified Model for Cloud Data Confidentiality." Asian Journal of Science and Applied Technology 7, no. 1 (2018): 23–27. http://dx.doi.org/10.51983/ajsat-2018.7.1.2786.

Full text
Abstract:
Cloud computing is a developing technology which gets more attention from both the industries and academia. The cloud storage is one of the main benefit in cloud computing, which is particularly attractive for the users who needs unpredictable storage for their enterprises and so on. Minimum storage and processing cost is an obligatory requirement of all organization and industries, while analysis of data and information is mandatory in all organization. Although there is a reduction in cloud storage cost, customers has to face more technical and security problems such as data integrity, confi
APA, Harvard, Vancouver, ISO, and other styles
46

Hema S and Dr.Kangaiammal A. "A Secure Method for Managing Data in Cloud Storage using Deduplication and Enhanced Fuzzy Based Intrusion Detection Framework." November 2020 6, no. 11 (2020): 165–73. http://dx.doi.org/10.46501/ijmtst061131.

Full text
Abstract:
Cloud services increase data availability so as to offer flawless service to the client. Because of increasing data availability, more redundancies and more memory space are required to store such data. Cloud computing requires essential storage and efficient protection for all types of data. With the amount of data produced seeing an exponential increase with time, storing the replicated data contents is inevitable. Hence, using storage optimization approaches becomes an important pre-requisite for enormous storage domains like cloud storage. Data deduplication is the technique which compress
APA, Harvard, Vancouver, ISO, and other styles
47

Venkata, Raman Immidisetti. "NetApp Cloud Volumes ONTAP (CVO) for Disaster Recovery as a Service (DRaaS) and Cloud File Storage Migration: A Comprehensive Analysis." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 7, no. 2 (2021): 1–6. https://doi.org/10.5281/zenodo.15026697.

Full text
Abstract:
As organizations increasingly adopt cloud-based infrastructure, the transition from traditional disaster recovery (DR) solutions to Disaster Recovery as a Service (DRaaS) has become a strategic imperative. NetApp Cloud Volumes ONTAP (CVO) has emerged as a prominent DRaaS and cloud storage solution, offering seamless integration with public cloud providers, enhanced data protection, and optimized cost efficiency. This paper examines the role of NetApp CVO in disaster recovery, elucidating key features such as automated data replication, high availability, storage efficiency, and compliance enfo
APA, Harvard, Vancouver, ISO, and other styles
48

Mahmuda, Desy, Diah Risqiwati, and Denar Regata Akbi. "Perbandingan Uji Analisa Performansi Owncloud Dengan Menggunakan Network Attached Storage dan Distributed Replicated Blocked Device." Jurnal Repositor 3, no. 1 (2020): 155–60. http://dx.doi.org/10.22219/repositor.v2i9.881.

Full text
Abstract:
Kebutuhan pada jaringan dengan mengutamakan performa untuk mendukung sebuah efisiensi jaringan merupakan hal penting. Salah satu kesulitan yang di alami yaitu dalam hal pengarsipan. Untuk membuat sstem High Availability disini digunakan metode failover dimana metode failover merupakan metode ketersediaan siste jika salah satu server down atau mati. Tujuan dari penelitian ini yaitu membangun sistem penyimpanan berbasi cloud yang handal guna mencegah terjadinya down pada server dan membandingkan performansi sistem penyimpanan cloud computing menggunakan Network Attached Storage dan Distributed R
APA, Harvard, Vancouver, ISO, and other styles
49

Mollakuqe, Elissa, Ersan Hamdiu, Nida Santuri Fishekqiu, Samir Jakupi, and Jusuf Qarkaxhija. "Comparison of cloud storage in terms of privacy and personal data - Sync, pCloud, IceDrive and Egnyte." Open Research Europe 4 (June 28, 2024): 128. http://dx.doi.org/10.12688/openreseurope.16631.1.

Full text
Abstract:
The cloud, essentially a network of interconnected computers, has revolutionized data storage and sharing. Cloud storage, an integral part of this ecosystem, offers a virtual storage space spanning numerous physical devices. This technology relies on internet-based platforms hosted in data centers provided by service giants like Apple iCloud, Microsoft OneDrive, and Google Cloud Storage. While cloud storage enhances accessibility and convenience, it also introduces heightened risks, primarily due to the transfer of essential services to third-party providers. These risks encompass challenges r
APA, Harvard, Vancouver, ISO, and other styles
50

Beckham, Olly, Gord Oldman, Julie Karrie, and Dorth Craig. "Techniques used to formulate confidential data by means of fragmentation and hybrid encryption." International research journal of management, IT and social sciences 6, no. 6 (2019): 68–86. http://dx.doi.org/10.21744/irjmis.v6n6.766.

Full text
Abstract:
Cloud computing is a concept shifting in the approach how computing resources are deployed and purchased. Even though the cloud has a capable, elastic, and consistent design, several security concerns restrain customers to completely accept this novel technology and move from traditional computing to cloud computing. In the article, we aspire to present a form of a novel architectural model for offering protection to numerous cloud service providers with the intention to devise and extend security means for cloud computing. In this work, we presented a two-tier architecture for security in mul
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!