Auditing Services in Cloud Computing For Achieving Data Access Control
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1
Abstract
Cloud computing has a great tendancy of providing robust computational power to the society at reduced cost. The wide adoption of this promising computation model is prevented by security which is the primary obstacle especially for customers when their confidential data are consumed and produced during the computation. The data stored in the cloud may be frequently updated by the users. It has been reported by many authors on auditing methods to efficiently audit the cloud data storage without challenging the local copy of data, and introduce no additional on-line load to the cloud user. This paper is a survey of different algorithms used in different auditing mechanisms that have been considered to support the storage correctness of data in cloud environment.
Authors and Affiliations
N. Mahesh kumar
Voice Over Wifi Performance Evaluation and Comparisons of IEEE.802.11 B, A, G, N Releases
Abstract: Cellular networks are not always available indoors, either at home or work. 802.11 WiFi networks can solve part of this problem by providing Voice over WiFi (VoFi) phones or computer with communication devices...
Decision Tree Classification of Students Placement Factors Using R Data Miner
Student campus placement attitudes have largely been assessed using college students are relatively small samples. In addition, no systematic framework has been used to investigate the origins or influencing social facto...
The Data Analysis of Tencent Micro-blog User
Abstract: Micro-blog has been an important social network platform in recent years. With the advances in information influence and propagation ability, the date of micro-blog has attracted the attention of scholars of al...
IVRS and DTMF based Voting System
Abstract: A Voting System will be developed where a person can vote using a cell phone. A phone connected tothe voting system, will decode the DTMF pulses sent by another phone(mobile/landline) belonging to the vot...
Preventing Web-Proxy Based DDoS using Request SequenceFrequency
Abstract: In order to control the request flow in Computer Networks, a proxy server is used. Proxy Server is aserver which acts as an intermediary server between server and clients. The more adaptable and converted...