ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Cloud Computing and Data Concealing Techniques

Journal: International Journal of Computer Science and Mobile Applications IJCSMA (Vol.6, No. 7)

Publication Date:

Authors : ; ;

Page : 53-62

Keywords : Cloud; Distributed computing; Service Models; Deployment Models; Data Security; Data Masking Techniques;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Cloud or Distributed computing is an innovation, which gives ease, adaptable calculation limit and administrations to undertakings on interest for extension. Despite the fact that, distributed computing is encouraging the Information innovation industry, the innovative work in this field is yet to be acceptable. Distributed computing assets offered benefit on an as-required premise, and conveyed by IP-based network, giving exceedingly versatile, solid on-request benefits with lightfooted administration capacities. There are a considerable measure of improvement in the distributed computing, security of the information in the cloud has turned into the one of significant viewpoints in the distributed computing. Distributed computing is only the sharing of the assets in an open situation which prompts the security issues. This paper point is to give diverse models of distributed computing and information covering strategies for giving security.

Last modified: 2018-07-25 20:19:05