Amazing technological breakthrough possible @S-Logix pro@slogix.in

Office Address

  • #5, First Floor, 4th Street Dr. Subbarayan Nagar Kodambakkam, Chennai-600 024 Landmark : Samiyar Madam
  • pro@slogix.in
  • +91- 81240 01111

Social List

A New Technique of Data Integrity for Analysis of the Cloud Computing Security - 2013

A New Technique of Data Integrity for Analysis of the Cloud Computing Security

Research paper on A New Technique of Data Integrity for Analysis of the Cloud Computing Security

Research Area:  Cloud Security

Abstract:

Cloud computing is a latest and fast growing technology that offers an innovative, efficient and scalable business model for organizations to adopt various information technology resources i.e. software, hardware, network, storage, bandwidth etc. Cloud Computing is a jargon term without a commonly accepted non-ambiguous scientific or technical definition. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. It has the capability to incorporate multiple internal and external cloud services together to provide high interoperability there can be multiple accounts associated with a single or multiple service provider (SPs). So, Security in terms of integrity is most important aspects in cloud computing environment. In this paper, a detailed analysis of the cloud security problem is presented. Also the different problem in a cloud computing system and their effect upon the different cloud users are analyzed. It is providing a comparably scalable, position independent. Low cost platform for client-s data. Since cloud computing environment is constructed based on open Architecture and interface. Based on this analysis various computing system and their effect upon the system, upon organizations and also upon different cloud users are analyzed. It is providing a comparably scalable, position-independent, low cost platform for client-s data. Since cloud computing environment is constructed based on open architecture and interface. Based on this analysis various researches have also presented a view of measures that can be taken to deal with the cloud security problem and prevention that must be taken into account by any organization and cloud users seeking investment in cloud computing.

Keywords:  
Cloud security
data storage
integrity verification
IaaS
PaaS
SaaS

Author(s) Name:  Rajkumar Chalse; Ashwin Selokar; Arun Katara

Journal name:  

Conferrence name:  2013 5th International Conference and Computational Intelligence and Communication Networks

Publisher name:  IEEE

DOI:  10.1109/CICN.2013.103

Volume Information: