Secure Data Process in Distributed Cloud Computing

被引:0
|
作者
Sharmila, P. [1 ]
Danapaquiame, N. [1 ]
Subhapriya, R. [1 ]
Janakiram, A. [1 ]
Amudhavel, J. [2 ]
机构
[1] Sri Manakula Vinayagar Engn Coll, Dept CSE, Pondicherry, India
[2] KL Univ, Dept CSE, Guntur, Andhra Pradesh, India
来源
关键词
CLIENT REQUEST; DISTRIBUTED CLOUD RESOURCES; DOWNLOADING DATA; UPLOADING DATA;
D O I
暂无
中图分类号
Q81 [生物工程学(生物技术)]; Q93 [微生物学];
学科分类号
071005 ; 0836 ; 090102 ; 100705 ;
摘要
Cloud is display for empowering administrations, clients' requirement, convenient and on-request N/W access to a common pool of configurable processing assets. Cloud is for the most part transfer and download the information. Transferring information's with separate to the information transmissions. The different instruments and gathered at an exceptional scale. Such huge volume of information produced is alluded to as large information, which now are altering all parts of our life going from endeavour's to people, from science groups to governments, as they show incredible possibilities to enhance effectiveness of ventures and the personal satisfaction. To get nontrivial designs and get important data from enormous information, an essential issue is the way to legitimately put the gathered information by various clients to circulated mists. Proficiently dissect the gathered information to spare client costs in information stockpiling and preparing, especially the cost reserve funds of clients who share information. Thu sly, it needs the nearby joint efforts among the clients, by sharing and using the enormous information in appropriated mists because of the multifaceted nature and volume of huge information.
引用
收藏
页码:75 / 84
页数:10
相关论文
共 50 条
  • [1] A Distributed Mobile Cloud Computing Model for Secure Big Data
    Sung, Soonhwa
    Youn, Cheong
    Kong, Eunbae
    Ryou, Jaecheol
    [J]. 2016 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2016, : 312 - 316
  • [2] Secure Rendering Process in Cloud Computing
    Baharon, Mohd Rizuan
    Shi, Qi
    Llewellyn-Jones, David
    Merabti, Madjid
    [J]. 2013 ELEVENTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2013, : 82 - 87
  • [3] Intelligent cryptography approach for secure distributed big data storage in cloud computing
    Li, Yibin
    Gai, Keke
    Qiu, Longfei
    Qiu, Meikang
    Zhao, Hui
    [J]. INFORMATION SCIENCES, 2017, 387 : 103 - 115
  • [4] Secure storage of data in cloud computing
    20150500466883
    [J]. (1) School of Computer and Software and Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science and Technology, Nanjing; 210044, China, 1600, IEEE Tainan Section; International Society of Management Engineers; JSPS/NSFC/NRF A3 Foresight Program Ultra-Realistic Acoustic Interactive Communication on Next-Generation Internet; Tainan Chapter of IEEE Signal Processing Society; Waseda University (Institute of Electrical and Electronics Engineers Inc.):
  • [5] Secure torage of Data in Cloud Computing
    Fu, Zhangjie
    Cao, Xinyue
    Wang, Jin
    Sun, Xingming
    [J]. 2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 783 - 786
  • [6] Secure Sharing of Data in Cloud Computing
    Tiwari, Deepnarayan
    Gangadharan, G. R.
    [J]. SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 24 - 35
  • [7] Secure cloud computing for genomic data
    Datta, Somalee
    Bettinger, Keith
    Snyder, Michael
    [J]. NATURE BIOTECHNOLOGY, 2016, 34 (06) : 588 - 591
  • [8] Secure cloud computing for genomic data
    Somalee Datta
    Keith Bettinger
    Michael Snyder
    [J]. Nature Biotechnology, 2016, 34 : 588 - 591
  • [9] INTEGRATE MILITARY WITH DISTRIBUTED CLOUD COMPUTING AND SECURE VIRTUALIZATION
    Reddy, J. Mounika
    Monika, J. Mary
    [J]. 2012 SC COMPANION: HIGH PERFORMANCE COMPUTING, NETWORKING, STORAGE AND ANALYSIS (SCC), 2012, : 1200 - 1206
  • [10] Research of Data Secure Based on Cloud Computing
    Shi Yan-rong
    Zhao Xiao-fang
    Chen Shu-yin
    [J]. 2014 IEEE WORKSHOP ON ELECTRONICS, COMPUTER AND APPLICATIONS, 2014, : 202 - 204