A Secure File Store in Cloud Environment using HABE

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Secure Mobile Cloud Storage Environment using Encryption Algorithm

Cloud computing frameworks such as, Google App Engine, Amazon Web Services, Windows Azure, and open source frameworks such as OpenStack have become increasingly popular among practitioners. Also, the growth in usage and deployment of smartphone platforms and applications worldwide is increasing rapidly. Mobile cloud computing promotes use of cloud based services in a mobile environment. Data an...

متن کامل

Improving Data Availability Using Combined Replication Strategy in Cloud Environment

As grow as the data-intensive applications in cloud computing day after day, data popularity in this environment becomes critical and important. Hence to improve data availability and efficient accesses to popular data, replication algorithms are now widely used in distributed systems. However, most of them only replicate the static number of replicas on some requested chosen sites and it is ob...

متن کامل

Secure Data Forwarding In Distributed Environment Using Cloud Storage System

A cloud storage system, used to store large number of data in storage server. Cloud system is used to provide large number storage servers, which provide long-term storage service over the Internet. Third party’s cloud system does not provide data confidentiality. Constructing centralized storage system for the cloud system makes hackers stole data easily. General encryption schemes protect dat...

متن کامل

Cloud Access Security On File System Using Secure Policies For Jelastic Cloud

Now a days we can outsource data backups offsite to third-party cloud storage services(Jelastic cloud) by which we can reduce data management costs. However, we need to provide security guarantees for the outsourced data, maintained by third parties. In this paper we design and implement FADE, a secure overlay cloud storage system which is able to achieve fine-grained, policy-based access contr...

متن کامل

Efficient and Secure File Deduplication in Cloud Storage

Outsourcing to a cloud storage brings forth new challenges for the efficient utilization of computing resources as well as simultaneously maintaining privacy and security for the outsourced data. Data deduplication refers to a technique that eliminates redundant data on the storage and the network, and is considered to be one of the most-promising technologies that offers efficient resource uti...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IJARCCE

سال: 2017

ISSN: 2278-1021

DOI: 10.17148/ijarcce.2017.6345