Encryption Technique for a Trusted Cloud ComputingEnvironment
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 1
Abstract
With varying amount of computing power present with everyone, it has become necessity of the hour to usecloud computing systems. It helps us to store our data within a virtual cloud structure. When we use the cloudstorage mechanism, the computing power gets distributed rather than being centralised. The whole system usesthe internet communication to allow linkage between client side and server side services/applications. Theservice providers may use the cloud platform as a web service platform or a data storage architecture. Thefreedom to use any device and location for cloud management is an added advantage for any user. Maintenanceof such systems is also easy as installation of resources aren’t required in each and every system which is usingcloud services. But along with varying flexibility and multi tenancy in usage comes the question of reliabilityand security. As in public hosting, the client is totally unaware of the security strategies applied by the serviceprovider, it creates a necessity for the end user to save the data from expected threats. One cannot totally relyon the quality of service (QoS) which is guaranteed by host servers. When we look at the security of data in thecloud computing, the vendor has to provide some assurance in service level agreements (SLA) to convince thecustomer on security factors. This paper describes a schema that ensures encryption of data using Advanced Encryption Standards. By doing so, the customer services can become quiet secured and thus can help in furtherenhancement of the cloud computing standards.
Authors and Affiliations
Aishwarya Asesh
Production of Clean Fuel from Waste Biomass using Combined Dark and Photofermentation
Sequential dark and photo- fermentation is a rather new approach in biological hydrogen gas production. In the present work, two-stage fermentation process consisting of dark and photo-fermentation periods was ca...
Cloud Based Vital Health Stats Monitoring using IoT
Abstract : While there are lot of devices and applications available for monitoring the vital health statistics of human beings, there is still room for enhancement and improvement. This paper’s intention is to address o...
A Web Extraction Using Soft Algorithm for Trinity Structure
Abstract: Trinity is a structure for automatically fetch or extract or segment the content from the website or thewebpages by the source of internet. The required applications are done by the trinity nature in orde...
Throughput and Error State Performance of AMC Scheme in 3G Wireless Systems
In this paper, Adaptive Modulation and Coding technique for OFDM is proposed. In this technique it is possible to switch the modulation order and coding rate in order to better match the channel conditions. The u...
Recapitulating the development initiatives of a robust information security safeguard: RITSB-the proposed solution
Most current information security systems performance vary with the nature of the filed its being operating. With an increased emphasizes on the adoption of security tools and technologies, the anomalies and &nb...