Data Security Models In Cloud Computing: A Review
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2015, Vol 3, Issue 1
Abstract
Cloud computing is a vastly growing information technology and its space continues to evolve at an astounding pace. It provides efficient model for organizations to take services over internet. Its professional services such as computing, software, data storage, hardware and network are growing like no other. Data storage service has been used in engineering, medical, private sectors. Now in many countries government also looks towards cloud to store their data known as g-cloud. In current time if any industry is evaluating technology replacements, upgrades or acquisitions, cloud has to be on their list of considerations. Apart from these cloud services have limitations because of lack in data security due to which in past many time cloud services have been interrupted. Data must be secured in cloud by use of effective encryption algorithms in proper way with the help of data security models. This paper covers data security issues in cloud, data security models and their comparisons.
Authors and Affiliations
Kavita Rathi, Narender
Performance Analysis of a 64-bit signed Multiplier with a Carry Select Adder Using VHDL
This paper presents a performance analysis of carrylook-ahead-adder and carry select adder signed data multiplier we are using, one uses a carry-look- ahead adder and the second one uses a carry select adder. The main fo...
AI Based Food Quality Recommendation System
Deep learning has been evidenced to be a cutting-edge technology for big data scrutiny with a huge figure of effective cases in image processing, speech recognition, object detection, and so on. Lately, it has also been...
Multilevel Inverter Based Active Power Filter With Energy Balanced DC Link Capacitor
This paper presents the modeling of a multilevel cascaded H-bridge inverter for a three phase shunt active power filter (APF). Multilevel-cascaded inverter can give better performance compared to other topologies. The DC...
Privacy-Preserving Updates to Databases with Security
Today’s databases speak to a critical stake for numerous requisitions. There is an expanded concern for security. The accessibility of tremendous amounts of databases recording an extensive assortment of data about peopl...
Cyber Attack Detection Using Machine Learning Techniques in IoT Networks
The Internet of Things is a rapidly emerging technology (IoT). Thanks to numerous sensors, billions of smart objects (referred to as "Things") may acquire data about themselves and their environment. So they may regulate...