Journal articles on the topic 'Cloud storage, availability'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cloud storage, availability.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
K. Sunitha, K. Sunitha, V. Tejaswini V. Tejaswini, and S. K. Prashanth S.K. Prashanth. "Ensuring Availability and Integrity of Data Storage in Cloud Computing." Paripex - Indian Journal Of Research 2, no. 2 (2012): 119–22. http://dx.doi.org/10.15373/22501991/feb2013/40.
Full textWu, Suzhen, Kuan-Ching Li, Bo Mao, and Minghong Liao. "DAC: Improving storage availability with Deduplication-Assisted Cloud-of-Clouds." Future Generation Computer Systems 74 (September 2017): 190–98. http://dx.doi.org/10.1016/j.future.2016.02.001.
Full textPrabu, Arjunan. "High Availability Architectures in Cloud Storage Systems: A Comprehensive Analysis." International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences 8, no. 3 (2020): 1–4. https://doi.org/10.5281/zenodo.14508530.
Full textPrabowo, Hari Yudho, Aan Restu Mukti, Suryayusra, and Tamsir Ariyadi. "Analisa Desain High Availability dan Uji Reabilitas Cloud Storage." Jurnal Indonesia : Manajemen Informatika dan Komunikasi 5, no. 1 (2024): 262–70. http://dx.doi.org/10.35870/jimik.v5i1.467.
Full textLi, Jun, and Mengshu Hou. "Improving Data Availability for Deduplication in Cloud Storage." International Journal of Grid and High Performance Computing 10, no. 2 (2018): 70–89. http://dx.doi.org/10.4018/ijghpc.2018040106.
Full textAr-Razy, Ikhwan, Rinta Kridalukmana, and Eko Didik Widianto. "Implementasi Cloud Storage Menggunakan OwnCloud yang High-Availability." Jurnal Teknologi dan Sistem Komputer 4, no. 2 (2016): 209. http://dx.doi.org/10.14710/jtsiskom.4.2.2016.209-214.
Full textHe, Zhong Lin, Yu Hua He, and Li Yu Chen. "A Study on the Key Issues of Cloud Storage Technology." Applied Mechanics and Materials 29-32 (August 2010): 1122–26. http://dx.doi.org/10.4028/www.scientific.net/amm.29-32.1122.
Full textLiang, Xiao Yang, and Lin Zhang. "Cloud Storage and Security Technology in the Application of the Internet Things." Applied Mechanics and Materials 533 (February 2014): 460–65. http://dx.doi.org/10.4028/www.scientific.net/amm.533.460.
Full textCost, efficient, V. Narasimha Prasad L, and Naveen Kumar D. "Intelligent Hybrid Cloud Data Hosting Services with Effective Cost and High Availability." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 4 (2017): 2176–82. https://doi.org/10.11591/ijece.v7i4.pp2176-2182.
Full textCui, Min, and Yipeng Wang. "EC-Kad: An Efficient Data Redundancy Scheme for Cloud Storage." Electronics 14, no. 9 (2025): 1700. https://doi.org/10.3390/electronics14091700.
Full textMyneni, Madhu Bala, L. V. Narasimha Prasad, and D. Naveen Kumar. "Intelligent Hybrid Cloud Data Hosting Services with Effective Cost and High Availability." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 4 (2017): 2176. http://dx.doi.org/10.11591/ijece.v7i4.pp2176-2182.
Full textRakesh, S., and Somsagar Sarfarazahmed. "Attribute-Based Encryption for Cloud IOT With Accountability and Privacy Protection." Advancement and Research in Instrumentation Engineering 6, no. 2 (2023): 36–41. https://doi.org/10.5281/zenodo.8210458.
Full textWijaya, Miftakhudin Kusuma, Zamah Sari, and Mahar Faiqurahman. "Implementasi High Availability Cloud Storage Dengan Metode Replikasi dan Failover Pada Laboratorium Teknik Informatika." Jurnal Repositor 2, no. 2 (2020): 165. http://dx.doi.org/10.22219/repositor.v2i2.245.
Full textSun, Xinwei, and Zhang Wei. "The Dynamic Data Privacy Protection Strategy Based on the CAP Theory." International Journal of Interdisciplinary Telecommunications and Networking 7, no. 1 (2015): 44–56. http://dx.doi.org/10.4018/ijitn.2015010104.
Full textWatane, Hemant N., Sundaranarayana D, Sunitha M, Bala Krishna Reddy V, Mohit Tiwari, and Edwin Prabhakar P B. "Secure Multi-Cloud Storage Systems Techniques for Data Integrity and Availability." ITM Web of Conferences 76 (2025): 03008. https://doi.org/10.1051/itmconf/20257603008.
Full textMuhammad Usman Ashraf. "A Survey on Data Security in Cloud Computing Using Blockchain: Challenges, Existing-State-Of-The-Art Methods, And Future Directions." Lahore Garrison University Research Journal of Computer Science and Information Technology 5, no. 3 (2021): 15–30. http://dx.doi.org/10.54692/lgurjcsit.2021.0503213.
Full textOKI, Eiji, Ryoma KANEKO, Nattapong KITSUWAN, Takashi KURIMOTO, and Shigeo URUSHIDANI. "Cloud Provider Selection Models for Cloud Storage Services to Satisfy Availability Requirements." IEICE Transactions on Communications E100.B, no. 8 (2017): 1406–18. http://dx.doi.org/10.1587/transcom.2016ebp3403.
Full textIdrus, Ali. "Designing High Availability Cluster Using Server Virtualization on Cloud Storage Services." IJISTECH (International Journal of Information System & Technology) 5, no. 2 (2021): 93. http://dx.doi.org/10.30645/ijistech.v5i2.119.
Full textIbtihal, Mouhib, El Ouadghiri Driss, and Naanani Hassan. "Homomorphic Encryption as a Service for Outsourced Images in Mobile Cloud Computing Environment." International Journal of Cloud Applications and Computing 7, no. 2 (2017): 27–40. http://dx.doi.org/10.4018/ijcac.2017040103.
Full textAhmed Ibrahim Turki and Qasim Mohammed Hussein. "Solutions of diagnosis of security issues and attacks for storage in cloud computing." Tikrit Journal of Pure Science 23, no. 4 (2018): 118–23. http://dx.doi.org/10.25130/tjps.v23i4.532.
Full textChen, Hong Jun, Tao Tan, and Xue Qin Wu. "Research of Cloud Storage and Data Read-Write Technology." Applied Mechanics and Materials 347-350 (August 2013): 3555–59. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.3555.
Full textSi, Hai Ping, and Yang Qiao. "Internal Cloud Storage Architecture Implemented in Crop Germplasm Resources Data." Advanced Materials Research 748 (August 2013): 1059–64. http://dx.doi.org/10.4028/www.scientific.net/amr.748.1059.
Full textDeineka, O. R. "ANALYSIS OF CURRENT TRENDS AND APPROACHES TO RELIABLE AND SECURE BIG DATA STORAGE." Computer systems and network 7, no. 1 (2025): 106–18. https://doi.org/10.23939/csn2025.01.106.
Full textBhargavi, Patel. "Enhancing Availability of Data in Mixed Homomorphic Encryption in Cloud." International Journal of Trend in Scientific Research and Development 3, no. 4 (2019): 1310–14. https://doi.org/10.5281/zenodo.3591017.
Full textMrs., Snehal A.Narale*1 &. Dr.P.K.Butey2. "PERFORMANCE ANALYSIS OF QOS USING DATA DISTRIBUTION TECHNIQUES IN CLOUD COMPUTING." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES [NC-Rase 18] (November 12, 2018): 31–38. https://doi.org/10.5281/zenodo.1483972.
Full textJulia, Myint1 and Thinn Thu Naing2. "MANAGEMENT OF DATA REPLICATION FOR PC CLUSTER BASED CLOUD STORAGE SYSTEM." International Journal on Cloud Computing: Services and Architecture(IJCCSA) 1, November (2018): 01–11. https://doi.org/10.5281/zenodo.1449827.
Full textRamesh Naidu, P., N. Guruprasad, and V. Dankan Gowda. "A High-Availability and Integrity Layer for Cloud Storage, Cloud Computing Security: From Single to Multi-Clouds." Journal of Physics: Conference Series 1921 (May 2021): 012072. http://dx.doi.org/10.1088/1742-6596/1921/1/012072.
Full textChansaeng, Tanagrit, and Chaiyaporn Khemapatapan. "Enhancing Multi-Cloud Storage: A Hybrid Framework Using Interleaving and LT Codes." Journal of Current Science and Technology 14, no. 3 (2024): 69. http://dx.doi.org/10.59796/jcst.v14n2.2024.69.
Full textRatnangi, Nirek. "Impact of Storage Solutions on Linux Pacemaker Cluster Performance in Critical Business Operations in cloud." Journal of Scientific and Engineering Research 10, no. 9 (2023): 254–66. https://doi.org/10.5281/zenodo.13918931.
Full textB, Shadaksharappa. "High Availability and Fault Tolerance in AWS." International Journal of Innovative Research in Information Security 09, no. 03 (2023): 66–72. http://dx.doi.org/10.26562/ijiris.2023.v0903.03.
Full textShi, Junjie, Jing Du, Yingwen Ren, Boyu Li, Jinwei Zou, and Anyi Zhang. "Convolution-LSTM-Based Mechanical Hard Disk Failure Prediction by Sensoring S.M.A.R.T. Indicators." Journal of Sensors 2022 (October 4, 2022): 1–15. http://dx.doi.org/10.1155/2022/7832117.
Full textShalom, G. Richa, and Ganesh Rohit Nirogi. "Decentralized Cloud Storage Using Blockchain." International Journal for Research in Applied Science and Engineering Technology 10, no. 9 (2022): 1294–300. http://dx.doi.org/10.22214/ijraset.2022.46810.
Full textXu, Ronghua, Yu Chen, Genshe Chen, and Erik Blasch. "SAUSA: Securing Access, Usage, and Storage of 3D Point CloudData by a Blockchain-Based Authentication Network." Future Internet 14, no. 12 (2022): 354. http://dx.doi.org/10.3390/fi14120354.
Full textGouru, Navya, and NagaLakshmi Vadlamani. "CoPS - Cooperative Provenance System with ZKP using Ethereum Blockchain Smart Contracts." International Journal of Distributed Systems and Technologies 9, no. 4 (2018): 40–53. http://dx.doi.org/10.4018/ijdst.2018100103.
Full textTaha, Hatem, Noura Aknin, and Kamal Eddin El kadiri. "A Novel Model of Data Storage Service in the Architecture Cloud Storage." International Journal of Online and Biomedical Engineering (iJOE) 15, no. 07 (2019): 66. http://dx.doi.org/10.3991/ijoe.v15i07.10094.
Full textGousteris, Solonas, Yoannis C. Stamatiou, Constantinos Halkiopoulos, Hera Antonopoulou, and Nikos Kostopoulos. "Secure Distributed Cloud Storage based on the Blockchain Technology and Smart Contracts." Emerging Science Journal 7, no. 2 (2023): 469–79. http://dx.doi.org/10.28991/esj-2023-07-02-012.
Full textRishabh, Mudgal*1 &. Mrs. Kirti Bhatia2. "ENHANCING DATA SECURITY USING ENCRYPTION AND SPLITTING TECHNIQUE OVER MULTI-CLOUD ENVIRONMENT." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 7, no. 8 (2018): 440–49. https://doi.org/10.5281/zenodo.1345684.
Full textZhou, Li, Chi Dong, Xindong You, Jie Huang, and Congfeng Jiang. "High Availability Green Gear-shifting Mechanism in Cloud Storage System." International Journal of Grid and Distributed Computing 8, no. 5 (2015): 303–14. http://dx.doi.org/10.14257/ijgdc.2015.8.5.30.
Full textTang, Yu, Hailong Sun, Xu Wang, and Xudong Liu. "Achieving convergent causal consistency and high availability for cloud storage." Future Generation Computer Systems 74 (September 2017): 20–31. http://dx.doi.org/10.1016/j.future.2017.04.016.
Full textYang, Jing Bo, Shu Huang, and Pan Jiang. "Research on Distributed Heterogeneous Data Storage Algorithm in Cloud Computing Data Center." Applied Mechanics and Materials 624 (August 2014): 553–56. http://dx.doi.org/10.4028/www.scientific.net/amm.624.553.
Full textOjha, Pranav. "Enhanced Cloud Computing Security Based on Single to Multi Cloud Systems." Journal of Research in Science and Engineering 6, no. 8 (2024): 52–56. http://dx.doi.org/10.53469/jrse.2024.06(08).12.
Full textGururaj, H. L. "A comprehensive analysis of security challenges in mobile cloud computing." i-manager’s Journal on Cloud Computing 10, no. 2 (2023): 35. http://dx.doi.org/10.26634/jcc.10.2.20419.
Full textAkherfi, Khadija, Hamid Harroud, and Michael Gerndt. "A Mobile Cloud Middleware to Support Mobility and Cloud Interoperability." International Journal of Adaptive, Resilient and Autonomic Systems 7, no. 1 (2016): 41–58. http://dx.doi.org/10.4018/ijaras.2016010103.
Full textDINESH, N.THILLAI, and A.SELVA DEVI. "SECURED MULTI-TENANCY APPROVAL FOR DATA STORAGE IN CLOUD." COMPUSOFT: An International Journal of Advanced Computer Technology 04, no. 06 (2015): 1837–40. https://doi.org/10.5281/zenodo.14786032.
Full textVithya Vijayalakshmi, A., N. Veeraragavan, and L. Arockiam. "A Unified Model for Cloud Data Confidentiality." Asian Journal of Science and Applied Technology 7, no. 1 (2018): 23–27. http://dx.doi.org/10.51983/ajsat-2018.7.1.2786.
Full textHema S and Dr.Kangaiammal A. "A Secure Method for Managing Data in Cloud Storage using Deduplication and Enhanced Fuzzy Based Intrusion Detection Framework." November 2020 6, no. 11 (2020): 165–73. http://dx.doi.org/10.46501/ijmtst061131.
Full textVenkata, Raman Immidisetti. "NetApp Cloud Volumes ONTAP (CVO) for Disaster Recovery as a Service (DRaaS) and Cloud File Storage Migration: A Comprehensive Analysis." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 7, no. 2 (2021): 1–6. https://doi.org/10.5281/zenodo.15026697.
Full textMahmuda, Desy, Diah Risqiwati, and Denar Regata Akbi. "Perbandingan Uji Analisa Performansi Owncloud Dengan Menggunakan Network Attached Storage dan Distributed Replicated Blocked Device." Jurnal Repositor 3, no. 1 (2020): 155–60. http://dx.doi.org/10.22219/repositor.v2i9.881.
Full textMollakuqe, Elissa, Ersan Hamdiu, Nida Santuri Fishekqiu, Samir Jakupi, and Jusuf Qarkaxhija. "Comparison of cloud storage in terms of privacy and personal data - Sync, pCloud, IceDrive and Egnyte." Open Research Europe 4 (June 28, 2024): 128. http://dx.doi.org/10.12688/openreseurope.16631.1.
Full textBeckham, Olly, Gord Oldman, Julie Karrie, and Dorth Craig. "Techniques used to formulate confidential data by means of fragmentation and hybrid encryption." International research journal of management, IT and social sciences 6, no. 6 (2019): 68–86. http://dx.doi.org/10.21744/irjmis.v6n6.766.
Full text