Secured Architecture To Access Cloud Based Services

Abstract

Cloud computing is new software IT revolution refers to the delivery of computer resources over the internet. Cloud storage is about much more than hosting online media. You need to deliver online media content, such as streaming video, fast enough for your web viewing audience. But sometimes user determine the selection cloud services may have loss of confidentiality and data emission this paper aims to provide maximal safeness and confidentiality to the data placed on the cloud by using two way validation process and Tresorit-The ultimate way to stay safe in the cloud with the use of factors to the internet browsers. The main advantage of this application is to provide maximum security and maintenance free service. The uniqueness of this process is to keep the data on different clouds which produces a thereat free application to end user.

Authors and Affiliations

Ch V. V Ganeswara Rao, Chokkapu Narayanarao

Keywords

Related Articles

Design of Low Power FPGA using Autonomous Power Gating and LEDR Encoding

The most important key challenge in the IC scaling era is to deliver high performance solutions in the process of minimizing power, area and cost. The main objective of this paper is to reduce power consumption by co...

SecSDLC: A Practical Life Cycle Approach for Cloud-based Information Security

Cloud computing services offer significant benefits to information technology (IT) systems such as reduced cost and shorter implementation time compared to traditional IT environments. However, the cloud multitenancy...

A Regression Model for the Grades of Students of Database for Prediction

In this paper a suitable regression curve is investigated for the grades of the student’s database course and it is found that Y = 0.32 + .0 5816 X where x could be the midterm exam grade and the final exam grades c...

Hybrid SVM Data mining Techniques for Weather Data Analysis of Krishna District of Andhra Region

Weather Prediction is the application of science and technology to estimate the state of atmosphere at a particular spatial location. Due to the availability of huge data researchers got interest to analyze and forec...

Enhancing NBTI Recovery in 7T SRAM Cell through Fine-Grained Recovery Boosting

Negative Bias Temperature Instability (NBTI) is becoming a major reliability problem in the semiconductor industry. NBTI Aging of a Static Random Access Memory (SRAM) cell leads to a lower noise margin, thereby incr...

Download PDF file
  • EP ID EP28129
  • DOI -
  • Views 275
  • Downloads 1

How To Cite

Ch V. V Ganeswara Rao, Chokkapu Narayanarao (2014). Secured Architecture To Access Cloud Based Services. International Journal of Research in Computer and Communication Technology, 3(12), -. https://europub.co.uk/articles/-A-28129