Trusted Cloud for Data Sharing
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 4
Abstract
Cloud computing is a general term for anything that involves delivering hosted services over the internet. These services are broadly divided into three categories: Infrastructure-as-a-Service (IaaS), Platform-as-a Service (PaaS) and Software-as-a-Service (SaaS). A cloud service has three distinct characteristics that differentiate it from traditional hosting. It is sold on demand, typically by the minute or the hour; it is elastic - a user can have as much or as little of a service as they want at any given time and the service is fully managed by the cloud service provider (the consumer needs nothing but a personal computer and Internet access).The advantage of cloud is cost savings. The prime disadvantage is security. Cloud computing is used by many software industries nowadays. Since the data placed in the cloud is accessible to everyone, security is not guaranteed. Cloud Computing provides the way to share distributed resources and services that belong to different organizations or sites. Since Cloud Computing share distributed resources via network in the open environment thus it makes security problems. All types of users who require the secure transmission or storage of data in any kind of media or network. By this new technology, users also start worrying about losing control of their own data. The data processed on clouds are often outsourced, leading to a number of issues related to accountability, including the handling of personally identifiable information. Such fears are becoming a significant barrier to the wide adoption of cloud services. To allay users’ concerns, it is essential to provide an effective mechanism for users to monitor the usage of their data in the cloud. For example, users need to be able to ensure that their data are handled according to the service level agreements made at the time they sign on for services in the cloud.
Authors and Affiliations
Vishal V. Bhanawase*
A REVIEW PAPER ON ASSOCIATION RULES FOR PRIVACY-PRESERVING MINING FROM VARIOUS ENCRYPTION TECHNIQUES
A new consequence has been significant in the Cloud computing in the example of data mining as a service, a company missing in proficiency or computational its mining needs to a third party service provider, the...
History, Importance & Wonder of Network Security in Present
Network Security is the most vital component in information security because it is responsible for securing all information passed through networked computers. Network Security refers to all hardware and software...
OPTIMIZATION OF FRICTION STIR SPOT WELDING PARAMETERS OF DISSIMILAR WELDED JOINTS OF ALUMINUM ALLOY (AA2024T3) WITH PURE COPPER SHEETS
Friction stir spot welding (FSSW) was performed for welding of an aluminum alloy AA2024T3 sheet to commercial pure copper sheet of 2mm thick. Friction stir spot welding are carried out at different tool rotational...
Power Optimization in Domino Circuits using Stacked Transistors
In this work low leakage and high noise immunity domino circuit is analysed. Usually power and noise immunity are optimized at the expense of reduced speed. The domino circuit described has negligible speed degra...
A Review on Optimization of Piezoelectric Power Generation in Taper Cantilever Beam at Different Tip Mass Position
Energy supply from piezoelectric material using environmental vibrations is very attractive because they possess more mechanical energy for conversion into electrical energy and can withstand large amount of strain also...