An Implementation for Conserving Privacy based on Encryption Process to Secured Cloud Computing Environment

Abstract

 This paper describes a study on the existing methods, techniques and proposed implementation approach for cloud computing. Cloud computing is a style of computing in which dynamically scalable and often virtualized resources are provided ‘As a service’ over the Internet. It provides on demand and at scale services for network infrastructure, platforms, and applications based on an off premise, pay-as-you-go operational model. Files and other data can be stored in the cloud and be accessed from any Internet connection. But some security or privacy issues should be taken into account while using this services such as private information disclosure problem while data being shared within the cloud, unauthorized access to personal data, Unauthorized secondary storage, Uncontrolled data propagation etc. Various service providers apply different methods to solve privacy problems but it is not sufficient. In this paper, a survey on the security policies, trust & privacy issues are studied & based on that the proposed system created & implemented. It is very important in today’s world to provide trusted service for cloud data storage, so that the users trust an encryption approach that is implemented in the proposed work. It checks the integrity & consistency of stored data on the cloud. So, the proposed implemented approach can be used by cloud service providers in order to get a secured cloud computing environment.

Authors and Affiliations

Paresh D. Sharma

Keywords

Related Articles

 A Review on Data Warehouse Management

 Data warehouse management is a crucial part of industry and business that have been adopted and put into practice with increased complexity of managing pools of data. The architectural layout of data warehousing i...

 SECURITY CHALLENGES WITH CLOUD COMPUTING

 Cloud computing provides Internet-based services, computing, and storage for users in all markets including financial, healthcare, and government. This new approach to computing allows users to avoid upfront hardw...

Classification of Intact Cashew Grading System with Fuzzy Logic

This paper proposed an intelligent fuzzy logic based computer vision system for classification of whole cashew kernels by assigning the grades. Proposed approach is divided into various phases. Image acquisition phase...

SCHOOL PURPOSE AMPLIFIER

The world over the decade's has made considerable advancement in automation ,automation is employed in home ,industries, commercial & educational sector. In this work ,a microcontroller base automatic school bell ti...

Constant Stress Accelerated Life Testing Using Rayleigh Geometric Process Model

The current study introduces the Rayleigh geometric process model for the analysis of accelerated life testing under constant stress. The geometric process describes a simple monotone process and has been applied to a...

Download PDF file
  • EP ID EP106321
  • DOI -
  • Views 77
  • Downloads 0

How To Cite

Paresh D. Sharma (30).  An Implementation for Conserving Privacy based on Encryption Process to Secured Cloud Computing Environment. International Journal of Engineering Sciences & Research Technology, 3(2), 525-532. https://europub.co.uk/articles/-A-106321