An Implementation for Conserving Privacy based on Encryption Process to Secured Cloud Computing Environment

Abstract

 This paper describes a study on the existing methods, techniques and proposed implementation approach for cloud computing. Cloud computing is a style of computing in which dynamically scalable and often virtualized resources are provided ‘As a service’ over the Internet. It provides on demand and at scale services for network infrastructure, platforms, and applications based on an off premise, pay-as-you-go operational model. Files and other data can be stored in the cloud and be accessed from any Internet connection. But some security or privacy issues should be taken into account while using this services such as private information disclosure problem while data being shared within the cloud, unauthorized access to personal data, Unauthorized secondary storage, Uncontrolled data propagation etc. Various service providers apply different methods to solve privacy problems but it is not sufficient. In this paper, a survey on the security policies, trust & privacy issues are studied & based on that the proposed system created & implemented. It is very important in today’s world to provide trusted service for cloud data storage, so that the users trust an encryption approach that is implemented in the proposed work. It checks the integrity & consistency of stored data on the cloud. So, the proposed implemented approach can be used by cloud service providers in order to get a secured cloud computing environment.

Authors and Affiliations

Paresh D. Sharma

Keywords

Related Articles

 A Survey on Performance Analysis of AODV and DSR

 A Wireless network is a collection of autonomous mobile nodes that communicate with each other over wireless links without any fixed infrastructure. It is a method by which homes, telecommunications networks and...

 Simple and Cost Effective Environment Monitoring System

 Monitoring Environmental factors such as temperature measurement, light intensity, relative humidity and air composition are not only important for industrial purposes but also a cause of growing concern in our da...

STUDY ON DUCTILITY AND CRACK BEHAVIOUR OF ENGINEERED CEMENTITIOUS COMPOSITES BASED FERROCEMENT

The Reinforced cement concrete structure shows good behaviour at all loading conditions but it is bulky and has increased cost. In order to reduce the self weight the ferrocement panels can be used in place of reinforce...

 Comparison Of MIMO

 This paper proposes a simple and efficient method to study the MIMO OFDM using adaptive equalizer. This paper described about bit error rate with the addition of equalizer reduce the bit error rate and the channe...

 Study on Economical Aspect of R.C.C Beam Slab Construction and Grid Slab Construction

 This paper presents the comparison of R.C.C Beam Slab, One-Way Continuous Slab and Grid Slab. This work includes the design and estimates for R.C.C Beam Slab, One-Way Continuous Slab and Grid Slab. The aim of this...

Download PDF file
  • EP ID EP106321
  • DOI -
  • Views 74
  • Downloads 0

How To Cite

Paresh D. Sharma (30).  An Implementation for Conserving Privacy based on Encryption Process to Secured Cloud Computing Environment. International Journal of Engineering Sciences & Research Technology, 3(2), 525-532. https://europub.co.uk/articles/-A-106321