ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

An Implementation for Conserving Privacy based on Encryption Process to Secured Cloud Computing Environment

Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.3, No. 2)

Publication Date:

Authors : ; ;

Page : 525-532

Keywords : Cloud computing; Trust; Security; Privacy; Integrity.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

This paper describes a study on the existing methods, techniques and proposed implementation approach for cloud computing. Cloud computing is a style of computing in which dynamically scalable and often virtualized resources are provided ‘As a service’ over the Internet. It provides on demand and at scale services for network infrastructure, platforms, and applications based on an off premise, pay-as-you-go operational model. Files and other data can be stored in the cloud and be accessed from any Internet connection. But some security or privacy issues should be taken into account while using this services such as private information disclosure problem while data being shared within the cloud, unauthorized access to personal data, Unauthorized secondary storage, Uncontrolled data propagation etc. Various service providers apply different methods to solve privacy problems but it is not sufficient. In this paper, a survey on the security policies, trust & privacy issues are studied & based on that the proposed system created & implemented. It is very important in today’s world to provide trusted service for cloud data storage, so that the users trust an encryption approach that is implemented in the proposed work. It checks the integrity & consistency of stored data on the cloud. So, the proposed implemented approach can be used by cloud service providers in order to get a secured cloud computing environment.

Last modified: 2014-08-13 22:34:17