Authorization Based Secure Data Transaction in Cloud Computing

Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2014, Vol 11, Issue 9

Abstract

Analyze in cloud computing be in the receipt of distributed process in transacting database utilize over cloud servers entities work in the evidence of authorization that are given an explanation for collection certified proof of authority. The proof and status it’s corrected and collects over the expended a point of time duration below the threat of process an authority policy of the client confident actuality not available circumstances. In this paper we focus on the felt finding of the problem we are defining the normal understanding trusted transaction when we are dealing with the proof of authorization in cloud computing and users can obtain there computation and storage to servers and it is also called cloud. Cloud can make available for use different like application ex (Google apps, what’s app) a large amount of data stored in clouds it’s highly quick to detect security and privacy. It is more important problems in cloud computing. The users must authenticate itself before initialization of any transaction it must be make sure that the cloud are other clients the cloud computing it keep the clients accounts is the facts it outsources the cloud computing itself responsible to the service part from the specialist solution make sure the secure and lack of disturbance and it is also require for code implementation.

Authors and Affiliations

V. Vamsikrishna , P. Boominathan

Keywords

Related Articles

 Power Reduction of FPGA by Guarded Evaluation Considering Logic Architecture in SOC Technology

 In this paper, guarded evaluation is a dynamic power reduction technique by identifying sub circuits inputs and kept constant at specific times during circuit operation. In certain condition, some signals within th...

 Secure Data Transfer using Cryptography with Virtual Energy for Wireless Sensor Network

 The wireless sensor network technology is one of the largest data processing and communication networks systems which continuously developed for distributed environment in field of real time application. There are...

 Face Recognition using Principle Component Analysis for Biometric Security System

 Face recognition is an application area where computer vision research is utilized in both military and commercial products. It is a process of identifying or verifying a person from an image and comparing the se...

 K-LEACH: An improved LEACH Protocol for Lifetime Improvement in WSN

 A Wireless Sensor Network is the collection of large number of sensor nodes, which are technically or economically feasible and measure the ambient condition in the environment surrounding them. The difference betw...

An Evolutionary Approach for Optimal Citing and Sizing of Micro-Grid in Radial Distribution Systems

This Paper presents the methodology of penetration of Micro-Grids (MG) in the radial distribution system (RDS). The aim of this paper is to minimize a total real power loss that descends the performance of the radial dis...

Download PDF file
  • EP ID EP94437
  • DOI -
  • Views 109
  • Downloads 0

How To Cite

V. Vamsikrishna, P. Boominathan (2014). Authorization Based Secure Data Transaction in Cloud Computing. INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY, 11(9), 446-449. https://europub.co.uk/articles/-A-94437