An Implementation for Conserving Privacy based on Encryption Process to Secured Cloud Computing Environment

Abstract

 This paper describes a study on the existing methods, techniques and proposed implementation approach for cloud computing. Cloud computing is a style of computing in which dynamically scalable and often virtualized resources are provided ‘As a service’ over the Internet. It provides on demand and at scale services for network infrastructure, platforms, and applications based on an off premise, pay-as-you-go operational model. Files and other data can be stored in the cloud and be accessed from any Internet connection. But some security or privacy issues should be taken into account while using this services such as private information disclosure problem while data being shared within the cloud, unauthorized access to personal data, Unauthorized secondary storage, Uncontrolled data propagation etc. Various service providers apply different methods to solve privacy problems but it is not sufficient. In this paper, a survey on the security policies, trust & privacy issues are studied & based on that the proposed system created & implemented. It is very important in today’s world to provide trusted service for cloud data storage, so that the users trust an encryption approach that is implemented in the proposed work. It checks the integrity & consistency of stored data on the cloud. So, the proposed implemented approach can be used by cloud service providers in order to get a secured cloud computing environment.

Authors and Affiliations

Paresh D. Sharma

Keywords

Related Articles

PARAMETRIC STUDY TO UNDERSTAND THE SEISMIC BEHAVIOUR OF INTZE TANK SUPPORTED ON SHAFT

Elevated intze tanks are used to store large quantity of water. They are used to supply water under gravity. Intze tanks are known as modified version of cylindrical tanks. They may be shaft supported or trestle support...

 GRAPHICAL IMAGE AS AUTHENTICATION APPROACH IN CLOUD COMPUTING

 Graphical password is easy to remember as compared to alphanumerical password. Users tend to pick passwords that can be easily guessed. In case, if user choose hard then it is difficult to remember. Graphical pass...

 Vibration Analysis of Laminated Composite Plates with Holes

 Fiber reinforced composite materials are widely used in variety of engineering applications due to its superior properties than the conventional materials. In this investigation free vibration analysis of four lay...

 IMPLEMENTATION OF VLSI ARCHITECTURE FOR RECONFIGURABLE RRC FIR FILTER USING GRAPH BASED METHOD

 The essential factors which contributes for designing the architecture of reconfigurable pulse shaping FIR filter are low complexity and power consumption. Although several low complexity architectures have been u...

 PROCESSING OF STRING THROUGH VARIOUS LANGUAGE IN AUTOMATA

 Language plays an important aspect in the life of all beings. Language can be defined as verbal, physical, biologically innate, and a basic form of communication. Language helps to fulfill our wants and needs. Lan...

Download PDF file
  • EP ID EP106321
  • DOI -
  • Views 54
  • Downloads 0

How To Cite

Paresh D. Sharma (30).  An Implementation for Conserving Privacy based on Encryption Process to Secured Cloud Computing Environment. International Journal of Engineering Sciences & Research Technology, 3(2), 525-532. https://europub.co.uk/articles/-A-106321