Implementation of Multiple layer security of Cloud server

2018 ◽  
Vol 6 (4) ◽  
pp. 236-241
Author(s):  
Neetu Rani ◽  
◽  
◽  
Sandeep Dalal
Keyword(s):  
Author(s):  
Sanjeev Kumar ◽  
Mukesh Kumar

Cloud services[1] are offering flexible & scalable services. But there is always issue of security. When data is transferred from centrally located server storage to different cloud compromise of person & private data would increase.  There is always risk to confidentiality & availability of data prior to selecting a cloud vender or choosing own cloud & cloud service migration. Cloud services usually have their security concerns that must be addressed. In this paper we have discussed threats to cloud service & data in case of conventional security system & modern security system & proposed an idea to secure data on cloud using multiple layers of security.


Author(s):  
P.Venu Gopala Rao ◽  
Eslavath Raja ◽  
Ramakrishna Gandi ◽  
G. Ravi Kumar

IoT (Internet of Things) has become most significant area of research to design an efficient data enabled services with the help of sensors. In this paper, a low-cost system design for e-healthcare service to process the sensitive health data is presented. Vital signs of the human body are measured from the patient location and shared with a registered medical professional for consultation. Temperature and heart rate are the major signals obtained from a patient for the initial build of the system. Data is sent to a cloud server where processing and analysis is provided for the medical professional to analyze. Secure transmission and dissemination of data through the cloud server is provided with an authentication system and the patient could be able to track his data through a smart phone on connecting to the cloud server. A prototype of the system along with its design parameters has been discussed.


2013 ◽  
Vol 32 (2) ◽  
pp. 392-394
Author(s):  
Hua-lin XIA ◽  
Yang-sen ZHANG
Keyword(s):  

2016 ◽  
Vol 55 (3) ◽  
pp. 032101 ◽  
Author(s):  
Thomas Frost ◽  
Arnab Hazari ◽  
Anthony Aiello ◽  
Md Zunaid Baten ◽  
Lifan Yan ◽  
...  

2018 ◽  
Vol 7 (1.9) ◽  
pp. 200
Author(s):  
T A.Mohanaprakash ◽  
J Andrews

Cloud computing is associate inclusive new approach on however computing services square measure made and utilized. Cloud computing is associate accomplishment of assorted styles of services that has attracted several users in today’s state of affairs. The foremost enticing service of cloud computing is information outsourcing, because of this the information homeowners will host any size of information on the cloud server and users will access the information from cloud server once needed. A dynamic outsourced auditing theme that cannot solely defend against any dishonest entity and collision, however conjointly support verifiable dynamic updates to outsourced information. The new epitome of information outsourcing conjointly faces the new security challenges. However, users might not totally trust the cloud service suppliers (CSPs) as a result of typically they may be dishonest. It's tough to work out whether or not the CSPs meet the customer’s expectations for information security. Therefore, to with success maintain the integrity of cloud information, several auditing schemes are projected. Some existing integrity ways will solely serve for statically archived information and a few auditing techniques is used for the dynamically updated information. The analyzed numerous existing information integrity auditing schemes together with their consequences.


Sign in / Sign up

Export Citation Format

Share Document