A Survey on Secured Cloud Data Transaction Techniques
Journal Title: JOURNAL OF ADVANCES IN CHEMISTRY - Year 2016, Vol 12, Issue 19
Abstract
In the fast and furious world of Information Technology, one of the renowned phrase that has diminished all the vintage tools and boomed to a higher level with greater versatility of computing is cloud computing. It has created a stereotypical image that it could be more promising with multiple boons like flexibility, scalability, reliability and unsubstantial and limited operational costs. Though there are many valuable points to be considered in cloud computing, it has been noted that the latent cloud users are afraid of using this technology because of the unaddressed security reasons so that there is an exaggerated possibilities of hacking of information and loss of data. To overcome this scenario, we have taken an efficient approach in our research to facilitate the cloud users with proper asylum. In the stated article we examine the main covenant concerns present in this technology nowadays based on a skeleton for refuge subsists adopted from cloud service providers. Although there has been many solutions offered for this problem by many researchers, there are many flaws that has to be detected and eliminated out and has to be sorted out properly to enhance the users of cloud computing with exultation. Security issues linking to reliability, multitenancy, and group should be scrutinized extra fathomage for cloud to swamp over its security barricade and steps forward towards extensive agreement. The purpose of the paper is to offer a technique that enables Cloud Computing method to accomplish the efficiency of using the system assets and potency of the security examines without exchange between them.
Authors and Affiliations
E Dinesh, G Shanmugavadivel
PERFORMANCE ANALYSIS OF WATERMARKING APPROACH FOR VLSI DESIGN INTELLECTUAL PROPERTY PROTECTION
VLSI technology brought revolution in EDA industry. Fabrication of complicated system on a chip is possible by using reusable module called Intellectual Property (IP) core. IP cores that became an integral part of the el...
Infrared and Thermal Analysis of Vanadyl(II) Barbiturate Complex
An usual method for the preparation of vanadyl(II) barbiturate complex was performed under the chemical reaction of vanadyl(II) sulfate with barbituric acid (H2L) and formulated as: [VO(HL)2].2H2O. This new barbiturate c...
ACE gene polymorphism and serum ACE level with Progression of Nephropathy in Type 2 Diabetic Patients
Background. One of the most common complications of diabetes mellitus (DM) is diabetic nephropathy (DN).  Angiotensin- converting enzyme (ACE) gene was the first candidate gene of renin-angiotensin system (RAS) for pred...
Optimization of Process Parameters in Stir Casting of Hybrid Metal Matrix (LM25/SiC/B4C) Composite Using Taguchi Method
Aluminium based composites exhibit many attractive material properties such as increased stiffness, wear resistance, specific strength and vibration damping and decreased co-efficient of thermal expansion compared with t...
ASURVEY ON CLUSTER BASED LOAD BALANCINGAPPROACHESFOR WIRELESSSENSOR NETWORK
Wireless sensor network (WSN) is becoming a very interesting field of research in recent days. It has wide area of research due to various issues caused by the hardware capabilities of sensing nodes such as memory, power...