A Secure Data Sharing and Communication with Multiple Cloud Environments with Java API
Saved in:
| Title: | A Secure Data Sharing and Communication with Multiple Cloud Environments with Java API |
|---|---|
| Authors: | Ms. Shikha Joshi, Ms. Pallavi Jain |
| Contributors: | The Pennsylvania State University CiteSeerX Archives |
| Source: | http://www.theaccents.org/ijacr/papers/current_jun_2012/21.pdf. |
| Publication Year: | 2012 |
| Collection: | CiteSeerX |
| Subject Terms: | Security, Java API, High Scalability |
| Description: | Cloud storage enables users to access their data anywhere and at any time. It achieves the dream of getting computing, storage and communication resources as easy as to get water and electricity. All resources can be gotten in a plug-and-play way. It has the advantages of high scalability, ease-of-use, cost-effectiveness and simplifying infrastructure planning etc. However, the emerging use of cloud storage has led to the problem of verifying that storage server indeed store the data. When users store their data in cloud storage, they mostly concern about whether the data is intact. In this paper we propose an efficient approach for making cloud data management and sharing in a secure manner. For this we mainly concentrate on six different security majors which are Confidentiality |
| Document Type: | text |
| File Description: | application/pdf |
| Language: | English |
| Relation: | http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.300.4420; http://www.theaccents.org/ijacr/papers/current_jun_2012/21.pdf |
| Availability: | http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.300.4420 http://www.theaccents.org/ijacr/papers/current_jun_2012/21.pdf |
| Rights: | Metadata may be used without restrictions as long as the oai identifier remains attached to it. |
| Accession Number: | edsbas.9B96B20C |
| Database: | BASE |
| Abstract: | Cloud storage enables users to access their data anywhere and at any time. It achieves the dream of getting computing, storage and communication resources as easy as to get water and electricity. All resources can be gotten in a plug-and-play way. It has the advantages of high scalability, ease-of-use, cost-effectiveness and simplifying infrastructure planning etc. However, the emerging use of cloud storage has led to the problem of verifying that storage server indeed store the data. When users store their data in cloud storage, they mostly concern about whether the data is intact. In this paper we propose an efficient approach for making cloud data management and sharing in a secure manner. For this we mainly concentrate on six different security majors which are Confidentiality |
|---|
Nájsť tento článok vo Web of Science