Efficient and Secure Techniques for Protecting Data in the Cloud

被引:0
|
作者
Jeena, R. [1 ]
Kumar, S. Saravana [2 ]
Sudhan, S. Kavin Hari Hara [3 ]
机构
[1] Veltech Dr RR & Dr SR Tech Univ, Chennai, Tamil Nadu, India
[2] Panimalar Inst Technol, Dept IT, Chennai, Tamil Nadu, India
[3] St Peters Univ, Chennai, Tamil Nadu, India
关键词
Cloud data security; Virtualization; Data Integrity; Cloud Computing;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud computing is that the ability to maneuver infrastructure, services and applications into a knowledge center (cloud) atmosphere that's managed by some other person. There square measure many compelling reasons to maneuver bound applications and services into the cloud. Suppliers will pass on the lower prices from efficient, high-volume operations. Organizations will save on floor house and rack house, additionally as cooling and electricity prices. And outsourcing bound elements of the system's management provides time and resource savings additionally.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Techniques of secure storage for cloud data
    Feng, Chao-Sheng
    Qin, Zhi-Guang
    Yuan, Ding
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2015, 38 (01): : 150 - 163
  • [2] Addressing Techniques for Secure Data Sharing in Cloud
    Bhagat, Arti
    Rathee, Nisha
    [J]. PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 499 - 503
  • [3] Integrating encryption techniques for secure data storage in the cloud
    Seth, Bijeta
    Dalal, Surjeet
    Jaglan, Vivek
    Dac-Nhuong Le
    Mohan, Senthilkumar
    Srivastava, Gautam
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (04)
  • [4] Techniques to Secure Data on Cloud: Docker Swarm or Kubernetes?
    Modak, Arsh
    Chaudhary, S. D.
    Paygude, P. S.
    Idate, S. R.
    [J]. PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 7 - 12
  • [5] Protecting Mobile Health Records in Cloud Computing: A Secure, Efficient, and Anonymous Design
    Liu, Jianghua
    Ma, Jinhua
    Wu, Wei
    Chen, Xiaofeng
    Huang, Xinyi
    Xu, Li
    [J]. ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2017, 16 (02)
  • [6] Secure and Efficient Group Based Data Retrieval from Cloud Storage Using Obfuscation and Data Mining Techniques
    Suthar, Krunal
    Patel, Hiral
    [J]. 2017 INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND ITS ENGINEERING APPLICATIONS (ICSOFTCOMP), 2017,
  • [7] Secure and Efficient Cloud Data Deduplication With Randomized Tag
    Jiang, Tao
    Chen, Xiaofeng
    Wu, Qianhong
    Ma, Jianfeng
    Susilo, Willy
    Lou, Wenjing
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (03) : 532 - 543
  • [8] Efficient and Secure Cloud Storage for Handling Big Data
    Kumar, Arjun
    Lee, HoonJae
    Singh, Rajeev Pratap
    [J]. 2012 6TH INTERNATIONAL CONFERENCE ON NEW TRENDS IN INFORMATION SCIENCE, SERVICE SCIENCE AND DATA MINING (ISSDM2012), 2012, : 162 - 166
  • [9] Efficient and secure BIG data delivery in Cloud Computing
    Stergiou, Christos
    Psannis, Kostas E.
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (21) : 22803 - 22822
  • [10] An Efficient and Secure Scheme for Dynamic Shared Data in Cloud
    Hussien, Zaid Alaa
    Abduljabbar, Zaid Ameen
    Hussain, Mohammed Abdulridha
    Al Sibahee, Mustafa A.
    Lu, Songfeng
    Al-Asadi, Hamid A.
    [J]. PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND APPLICATION ENGINEERING (CSAE2019), 2019,