Efficient and Secure Techniques for Protecting Data in the Cloud

被引:0
作者
Jeena, R. [1 ]
Kumar, S. Saravana [2 ]
Sudhan, S. Kavin Hari Hara [3 ]
机构
[1] Veltech Dr RR & Dr SR Tech Univ, Chennai, Tamil Nadu, India
[2] Panimalar Inst Technol, Dept IT, Chennai, Tamil Nadu, India
[3] St Peters Univ, Chennai, Tamil Nadu, India
来源
2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES) | 2014年
关键词
Cloud data security; Virtualization; Data Integrity; Cloud Computing;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud computing is that the ability to maneuver infrastructure, services and applications into a knowledge center (cloud) atmosphere that's managed by some other person. There square measure many compelling reasons to maneuver bound applications and services into the cloud. Suppliers will pass on the lower prices from efficient, high-volume operations. Organizations will save on floor house and rack house, additionally as cooling and electricity prices. And outsourcing bound elements of the system's management provides time and resource savings additionally.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Techniques of secure storage for cloud data
    Feng, Chao-Sheng
    Qin, Zhi-Guang
    Yuan, Ding
    Jisuanji Xuebao/Chinese Journal of Computers, 2015, 38 (01): : 150 - 163
  • [2] SStore: An Efficient and Secure Provable Data Auditing Platform for Cloud
    Wang, Lipeng
    Hu, Mingsheng
    Jia, Zhijuan
    Guan, Zhi
    Chen, Zhong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 4572 - 4584
  • [3] Protecting Mobile Health Records in Cloud Computing: A Secure, Efficient, and Anonymous Design
    Liu, Jianghua
    Ma, Jinhua
    Wu, Wei
    Chen, Xiaofeng
    Huang, Xinyi
    Xu, Li
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2017, 16 (02)
  • [4] Secure and Efficient Group Based Data Retrieval from Cloud Storage Using Obfuscation and Data Mining Techniques
    Suthar, Krunal
    Patel, Hiral
    2017 INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND ITS ENGINEERING APPLICATIONS (ICSOFTCOMP), 2017,
  • [5] DIADD: Secure Deduplication and Efficient Data Integrity Auditing With Data Dynamics for Cloud Storage
    Zheng, Xiangshuo
    Shen, Wenting
    Su, Ye
    Gao, Yuan
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2025, 22 (01): : 299 - 316
  • [6] Efficient and Secure Cloud Storage for Handling Big Data
    Kumar, Arjun
    Lee, HoonJae
    Singh, Rajeev Pratap
    2012 6TH INTERNATIONAL CONFERENCE ON NEW TRENDS IN INFORMATION SCIENCE, SERVICE SCIENCE AND DATA MINING (ISSDM2012), 2012, : 162 - 166
  • [7] Secure and Efficient Data Sharing with User Revocation in Cloud
    Mallela, Nalini Sri
    Devarakonda, Nagaraju
    ADVANCED COMPUTATIONAL AND COMMUNICATION PARADIGMS, VOL 2, 2018, 706 : 563 - 573
  • [8] Secure and Efficient Cloud Data Deduplication with Ownership Management
    Jiang, Shunrong
    Jiang, Tao
    Wang, Liangmin
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2020, 13 (06) : 1152 - 1165
  • [9] Efficient and secure BIG data delivery in Cloud Computing
    Christos Stergiou
    Kostas E. Psannis
    Multimedia Tools and Applications, 2017, 76 : 22803 - 22822
  • [10] Enabling efficient and secure data sharing in cloud computing
    Li, Jingwei
    Li, Jin
    Liu, Zheli
    Jia, Chunfu
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2014, 26 (05) : 1052 - 1066