Security In Cloud Data Storage and Retrieval

Abstract

Cloud data storage empowers clients to remotely store their information and appreciate the secured cloud applications without the complexity in equipment and programming administration. In spite of the fact that the advantages are clear, such an administration is additionally surrendering clients' physical ownership of their outsourced information, which unavoidably postures new security dangers toward the accuracy of the information in cloud. The aim of the study is to address the new issue and provide a protected, true cloud storage administration, we propose in this paper an adaptable appropriated stockpiling trustworthiness evaluating component, using the homomorphic token and conveyed eradication coded information.

Authors and Affiliations

ZaidDerea Abdulameer

Keywords

Related Articles

Monitoring the efficiency of workflow in industry and secure access using NFC and Ethernet

Mobile phones have evolved from their usual function of calling to a lot more in the last decade, the 4G networks are being used for microwave access, But the use of mobile in field of Tele-monitoring is still a open...

Image Watermarking And Its Techniques: A Review

With the fast development in computer network and multimedia technology, the need of protecting the ownership of digital media becomes a major issue. Digital watermarking is a process of hiding imperceptible data int...

Loading Balance of Distribution Feeders With Loop Power Controllers In Centralised And PV Based Decentralised Power Generation Systems

For effective operation of distribution system , balanced loading on distribution feeders is very important. It mitigates power flow overloading and reduces power losses. In this paper, LOOP POWER CONTROLLER(LPC) is...

EEG and Picture Based Brain Controlled Pic and Place Robot for Paralyzed Patients

This anticipate talked about around a cerebrum controlled biometric in light of Brain–computer interfaces (BCI). BCIs are frameworks that can sidestep traditional channels of correspondence (i.e., muscles and thought...

A Novel Approach for Text Dependent Speaker Recognition

In recent times, person authentication in security systems using biometric technologies has grown rapidly. The voice is a signal of infinite information. Digital signal processes such as Feature Extraction and Feature...

Download PDF file
  • EP ID EP28330
  • DOI -
  • Views 284
  • Downloads 4

How To Cite

ZaidDerea Abdulameer (2015). Security In Cloud Data Storage and Retrieval. International Journal of Research in Computer and Communication Technology, 4(11), -. https://europub.co.uk/articles/-A-28330