Secured Architecture To Access Cloud Based Services

Abstract

Cloud computing is new software IT revolution refers to the delivery of computer resources over the internet. Cloud storage is about much more than hosting online media. You need to deliver online media content, such as streaming video, fast enough for your web viewing audience. But sometimes user determine the selection cloud services may have loss of confidentiality and data emission this paper aims to provide maximal safeness and confidentiality to the data placed on the cloud by using two way validation process and Tresorit-The ultimate way to stay safe in the cloud with the use of factors to the internet browsers. The main advantage of this application is to provide maximum security and maintenance free service. The uniqueness of this process is to keep the data on different clouds which produces a thereat free application to end user.

Authors and Affiliations

Ch V. V Ganeswara Rao, Chokkapu Narayanarao

Keywords

Related Articles

Financial Markets Prediction Using Quantitative Analysis (FMPQA)

Unlimited trade pressures forced the fiscal security organizations to explore the possibilities of information technology with the support of data mining technique. Now a days unbiased volume of trades in the markets...

Survey Paper on Music Beat Tracking

Tempo in music is beats perceived by us in unit time. The tempo is measured as number of beats per minute (BPM) in a music clip. This paper includes two algorithms used to measure tempo of music file. First one is an...

A Survey on Spelling Based CAPTCHA

CAPTCHA is one of the widely used techniques for preventing malicious programs from accessing the web resources automatically. In this paper compare spelling based CAPTCHA with other CAPTCHA.The proposed scheme, name...

Energy efficient cluster based approach in wireless Ad-hoc networks: Survey

A mobile ad-hoc network (MANET) is a collection of different mobile nodes. These nodes can communicate with each other over wireless networks using wireless links. The energy saving is an important challenge of wirel...

Confidential And Stabilized Security For Third Party On Clouds

Using Cloud Storage, users can remotely store their data and enjoy the ondemand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage...

Download PDF file
  • EP ID EP28129
  • DOI -
  • Views 264
  • Downloads 1

How To Cite

Ch V. V Ganeswara Rao, Chokkapu Narayanarao (2014). Secured Architecture To Access Cloud Based Services. International Journal of Research in Computer and Communication Technology, 3(12), -. https://europub.co.uk/articles/-A-28129