Secure Data Storage in the Cloud using Digital Signature Mechanism
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 4
Abstract
Cloud computing services need to address the security during the transmission of sensitive data and critical applications to shared and public cloud environments. The cloud environments are scaling large for data processing and storage needs. Cloud computing environment have various advantages as well as disadvantages on the data security of service consumers. In Cloud computing environment data protection as the most important security issue. In this issue, it concerns Include the way in which data is accessed and stored, audit requirements, compliance, and notification Requirements, issues involving the cost of data breach, and damage to brand value. In the cloud storage infrastructure, regulated and sensitive data needs to be properly segregated. It is very new Concept which is use for Data securing with the Help of Digital Signature in the cloud computing. In the service provider’s data center, protecting data privacy and managing compliance are critical by using encrypting and managing encryption keys of data in transfer to the cloud.In this Research Paper, we have tried to assess Cloud Storage Methodology and Data Security in cloud by the Implementation of digital signature with CFX_MF algorithm
Authors and Affiliations
Shobha Rajak, , Ashok Verma ,
Compare the results of Tuning of PID controller by using PSO and GA Technique for AVR system
—This paper Present to design method for determining the optimal proportional-integral-derivative (PID) controller parameters of an Automatic Voltage Regulator (AVR) system using the particle swarm optimization (...
Design of Colour and Texture Based Relevant Image Search Engine
Online Navigation behavior grows each passing day, due to the interest of people in digital images is growing day by day; so the Users in many professional fields are exploiting the opportunities offered by the abi...
A SURVEY ON CONTENT BASED IMAGE RETRIEVAL SYSTEM
Image mining is a vital technique which is used to mine knowledge from image. This is simply an expansion of data mining. The function of image mining is to retrieve similar image from huge database. The developm...
Agent in Ecommerce Application Based on Cloud Environment
— In this paper secure dealer agent mechanism is implemented to provide market oriented approach by using cloud computing environment. Cloud by leveraging technologies, provides thought on market based resource m...
Proposing Trust Count Based Validation Method to Lessen Internal Attacks in Mobile Adhoc Networks
Security is an essential service for wired and wireless network communications. The success of mobile ad hoc networks (MANET) strongly depends on people’s confidence in its security. However, the characteristics o...