Cloud Security: A Review on Third Party Auditor
Cloud security means providing security to user’s data. There are a lot of ways for doing this task. To make sure of the protection of users' data within the cloud, we have a tendency to propose a good, scalable and flexible cryptography mostly theme based. In depth security and performance analysis shows that the planned theme is highly economical and resilient against malicious knowledge modification attack, the planned theme not only solely achieves scalability owing to its hierarchical data structure, additionally inherits flexibility also. We have a tendency to implement our theme and show that it's both economical and versatile in addressing access management for outsourced knowledge in cloud computing with comprehensive experiments.
Cite this Article
Shende PC, Mude D. Cloud Security: A Review on Third Party Auditor. Journal of Open Source Developments. 2015; 2(1): 20–22p.
Buyya R, ShinYeo C, Broberg J, et al. Cloud Computing and Emerging it Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility. Future Generation Comput. Syst. 2009; 25: 599–616p.
Barbara B. Salesforce.com: Raising the Level of Networking. Inf. Today. 2010; 27: 45–45p.
Barlow K, Lane J. Like Technology from an Advanced Alien Culture: Google Apps for Education at ASU. Proc. ACM SIGUCCS User Services Conf., Orlando, FL. 2007.
Martin R. IBM Brings Cloud Computing to Earth with Massive New Data Centers. InformationWeek. Aug 2008 [Online]. http://www.informationweek.com/news/hardware/data_centers/209901523
Bobba R, Khurana H, Prabhakaran M. Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption. Proc. ESORICS, Saint Malo, France. 2009.
Bell J. Hosting Enterprise Data in the Cloud: Part 9: InvestmentValue Zetta, Tech. Rep. 2010.
- There are currently no refbacks.
This site has been shifted to https://stmcomputers.stmjournals.com/