Trust in Cloud Computing
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 4
Abstract
Cloud computing is the most recent technology in the Information technology industry which a lot of companies and government are putting much concern to make sure that they have benefited from this new innovation. However, the comfort of this innovation is still shaking and a lot of companies are now suffering from still storing their sensitive data in their data centres instead of storing them in the cloud as well. This research will be looking at the trust and privacy concern as the major player in the participation of the cloud and these factors have played a vital role in reducing full patronage of companies in the cloud business. Ideas and different architectures will be discussed to see how the industry has gone to overcome such doubt and as well as proffering solutions to the customers for their comfort and the providers as well. Some providers and incidences could be brought on board to discuss and how these disasters will be handle by both the customers and their providers.
Authors and Affiliations
Prasad I. Bhosle , andSwapnil A. Kasurkar
Image Edge Detection: A Review
Edge detection is important part of image processing for object detection. So it becomes extremely important to have a good understanding of edge detection algorithms. An edge is the real or imagined line that marks t...
A Java Applet Based Tool for Histogram Equalization and Edge Detection
Edge detection is a fundamentally important operation in image processing. It is the foundation of feature extraction and image information interpretation. It gives a description of the curvature of objects in an...
Scheme of security in Mobile Ad Hoc Networks using Route Blacklist Limit Mechanism
Routing protocols play an important role for communications in Mobile Ad Hoc Network Mobile Ad hoc Networks (MANET) has various types of Denial of Service Attacks (DoS) are possible because of the inherent limi...
Challenges in the Cloud Application Development
Anyone who develops and tests software is well-known with the Software Development Life Cycle (SDLC). By its very nature, cloud-based development offers an organization a high degree of agility; correspondingly, th...
A Model for identifying Guilty Agents in Data Transmission
Abstract-- This research paper presents a formal method for representing and detecting inconsistencies of combined secrecy models is to detect when the PC distributor’s sensitive data has been leaked by their a...