Security In Cloud Data Storage and Retrieval
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 11
Abstract
Cloud data storage empowers clients to remotely store their information and appreciate the secured cloud applications without the complexity in equipment and programming administration. In spite of the fact that the advantages are clear, such an administration is additionally surrendering clients' physical ownership of their outsourced information, which unavoidably postures new security dangers toward the accuracy of the information in cloud. The aim of the study is to address the new issue and provide a protected, true cloud storage administration, we propose in this paper an adaptable appropriated stockpiling trustworthiness evaluating component, using the homomorphic token and conveyed eradication coded information.
Authors and Affiliations
ZaidDerea Abdulameer
Monitoring the efficiency of workflow in industry and secure access using NFC and Ethernet
Mobile phones have evolved from their usual function of calling to a lot more in the last decade, the 4G networks are being used for microwave access, But the use of mobile in field of Tele-monitoring is still a open...
Image Watermarking And Its Techniques: A Review
With the fast development in computer network and multimedia technology, the need of protecting the ownership of digital media becomes a major issue. Digital watermarking is a process of hiding imperceptible data int...
Loading Balance of Distribution Feeders With Loop Power Controllers In Centralised And PV Based Decentralised Power Generation Systems
For effective operation of distribution system , balanced loading on distribution feeders is very important. It mitigates power flow overloading and reduces power losses. In this paper, LOOP POWER CONTROLLER(LPC) is...
EEG and Picture Based Brain Controlled Pic and Place Robot for Paralyzed Patients
This anticipate talked about around a cerebrum controlled biometric in light of Brain–computer interfaces (BCI). BCIs are frameworks that can sidestep traditional channels of correspondence (i.e., muscles and thought...
A Novel Approach for Text Dependent Speaker Recognition
In recent times, person authentication in security systems using biometric technologies has grown rapidly. The voice is a signal of infinite information. Digital signal processes such as Feature Extraction and Feature...