首页    期刊浏览 2025年04月29日 星期二
登录注册

文章基本信息

  • 标题:Client And Data Confidentiality In Cloud Computing Using Fragmentation Method
  • 本地全文:下载
  • 作者:Thota Reshma Kishore ; D.Akhila Devi ; S.Prathyusha
  • 期刊名称:International Journal of Soft Computing & Engineering
  • 电子版ISSN:2231-2307
  • 出版年度:2013
  • 卷号:3
  • 期号:2
  • 页码:337-339
  • 出版社:International Journal of Soft Computing & Engineering
  • 摘要:In Today’s world cloud computing has occupied a prior place in the emerging technologies cause of its ease of access at lower costs. According Moore’s Law computer technology, through transistors and integrated circuits, along with digital electronic devices, will double every 18 months to two years. It’s a steep curve that began in the 1960s and is expected to continue until about 2020. It is anticipated in the coming years there will be more than one trillion cloud-ready devices, allowing users to work more quickly, conveniently, and at lower cost...this phenomenon presents us with a great risk of data theft and privacy issues. especially for those dealing with sensitive information, Questions that arise include what methods are available and how can that information remain secure to ensure client protection and confidentiality? .Among these Confidentiality privacy is the main reason that many companies and also individuals to some extent are avoiding the cloud ready devices, which also needs be addressed. For this purpose we are proposing a new model that enables convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This report analyses the challenges posed by cloud computing and the standardization work being done by various standards development organizations (SDOs) to minimize privacy risks in the cloud, including the role of privacy-enhancing technologies (PETs).here the new model to provide confidentiality using fragmentation method The method supports minimal encryption to minimize the computations overhead due to encryption.
  • 关键词:Cloud computing; Data confidentiality;Fragmentation; Data outsourcing; Privacy preserving.
国家哲学社会科学文献中心版权所有