scholarly journals An Extended Approach for Efficient Data Storage in Cloud Computing Environment

Author(s):  
Fatemeh shieh ◽  
◽  
Mostafa Ghobaei Arani ◽  
Mahboubeh Shamsi
2018 ◽  
Vol 5 (2) ◽  
pp. 1 ◽  
Author(s):  
SHAFI'I MUHAMMAD ABDULHAMID ◽  
NAFISAT ABUBAKAR SADIQ ◽  
ABDULLAHI MOHAMMED ◽  
NADIM RANA ◽  
HARUNA CHIROMA ◽  
...  

2013 ◽  
Vol 347-350 ◽  
pp. 3312-3316
Author(s):  
Hong Jun Chen ◽  
Xue Qin Wu

The positive factors of the cloud computing: the great commercial value, the cheap and convenient use, has been recognized widely. But there are many risks on security. These security risks will greatly restrict the development of cloud computing. Cloud security risks such as: the cloud platform is easily vulnerable, cloud resources is easily abused, the cloud platform data is accessed by unauthorized user or the data is missing, the violations in the network is difficult to trace and survey, and the service providers replacement will affect the migration of the users data and services. So we research the virtualization technology, data backup and disaster recovery technology, encryption technology of data storage and transmission, the authentication technology of service providers and users, risk assessment, and legal constraints and safety training. Our research is strived to obtain a secure cloud computing environment.


2020 ◽  
Vol 5 (19) ◽  
pp. 26-31
Author(s):  
Md. Farooque ◽  
Kailash Patidar ◽  
Rishi Kushwah ◽  
Gaurav Saxena

In this paper an efficient security mechanism has been adopted for the cloud computing environment. It also provides an extendibility of cloud computing environment with big data and Internet of Things. AES-256 and RC6 with two round key generation have been applied for data and application security. Three-way security mechanism has been adopted and implemented. It is user to user (U to U) for data sharing and inter cloud communication. Then user to cloud (U to C) for data security management for application level hierarchy of cloud. Finally, cloud to user (C to U) for the cloud data protection. The security analysis has been tested with different iterations and rounds and it is found to be satisfactory.


2015 ◽  
Vol 713-715 ◽  
pp. 2447-2450
Author(s):  
Zhan Kun Zhao

Efficient data mining model design for a large database in the cloud computing environment is studied. For large databases efficiently mining problem, an efficient data mining model in the cloud computing environment based on improved manifold learning algorithms is proposed. The use of nonlinear manifold learning algorithms is able to reduce dimensionality of data vector feature in cloud computing environments, through characteristic extraction module to preprocess data, improved classical manifold learning algorithm is adopted to increase the distance between the data of sample spread intensive area and shorten the distance between the data of sample spread sparse area, prompting even overall distribution of sample database under cloud computing environment, so as to achieve accurate mining for efficient data in cloud computing environment. The experimental results show that the proposed method can accurately mine target data under cloud computing environments, with high efficiency and precision.


Author(s):  
Hadeel Mushtaq Shakir ◽  
Dr. Syed Zeeshan Hussain

Our understanding of the importance of cloud computing-based electronic commerce in the digital world involves researching and looking for the most important issues faced by electronic commerce and security threats, and user information protection, and as a result, an e-commerce application framework can be proposed which may be based on the concepts, the origins, and development trend of cloud computing which copes with the problem of e-commerce and the storage of resources. As it is on record that cloud computing is widely known for its robust and strong support for data storage and mining. It also offers a most reliable platform for safe, secure, and speedy data transactions at a very manageable cost and a high level of privacy. Therefore, this paper has examined, analyzed, and discussed the current state of e-commerce and also, we provide much literature that has researched the security problems e-commerce faces in a cloud computing environment and some of them suggested some e-commerce security solutions.


2018 ◽  
Vol 19 (4) ◽  
pp. 351-360
Author(s):  
Prabu S ◽  
Gpinath Ganapathy ◽  
Ranjan Goyal

Cloud computing is an evolving computing technology that provides many services such as software and storage. With the introduction of cloud storage, the security of outsourced data has become a major issue in cloud computing. Data storage in cloud computing environment needs to be secured in order to provide a safe and foolproof security for data outsourcing of the cloud service users. This paper presents a model for security of data in public cloud storage environment which successfully detects the unauthenticated access or any anomaly in the data. The proposed authentication model along with the data security model presented in this paper shows that this model is the best model suitable for securing the data in cloud computing environment


Sign in / Sign up

Export Citation Format

Share Document