A Secure Data Sharing and Communication with Multiple Cloud Environments with Java API
نویسندگان
چکیده
Cloud storage enables users to access their data anywhere and at any time. It achieves the dream of getting computing, storage and communication resources as easy as to get water and electricity. All resources can be gotten in a plug-and-play way. It has the advantages of high scalability, ease-of-use, cost-effectiveness and simplifying infrastructure planning etc. However, the emerging use of cloud storage has led to the problem of verifying that storage server indeed store the data. When users store their data in cloud storage, they mostly concern about whether the data is intact. In this paper we propose an efficient approach for making cloud data management and sharing in a secure manner. For this we mainly concentrate on six different security majors which are Confidentiality, Availability, Integrity, Possession, Authenticity and Utility. We implement these phenomena in java.
منابع مشابه
Study and Analysis of Data Sharing and Communication with Multiple Cloud Environments
Cloud storage enables users to access their data anywhere and at any time. It achieves the dream of getting computing, storage and communication resources as easy as to get water and electricity. All resources can be gotten in a plug-andplay way. It has the advantages of high scalability, ease-ofuse, cost-effectiveness and simplifying infrastructure planning etc. However, the emerging use of cl...
متن کاملAn Efficient Secret Sharing-based Storage System for Cloud-based Internet of Things
Internet of things (IoTs) is the newfound information architecture based on the internet that develops interactions between objects and services in a secure and reliable environment. As the availability of many smart devices rises, secure and scalable mass storage systems for aggregate data is required in IoTs applications. In this paper, we propose a new method for storing aggregate data in Io...
متن کاملA Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment
With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...
متن کاملAn Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks
Due to the explosion of smart devices, data traffic over cellular networks has seen an exponential rise in recent years. This increase in mobile data traffic has caused an immediate need for offloading traffic from operators. Device-to-Device(D2D) communication is a promising solution to boost the capacity of cellular networks and alleviate the heavy burden on backhaul links. However, dir...
متن کاملDecenCrypto Cloud: Decentralized Cryptography Technique for Secure Communication over the Clouds
With the advent of the World Wide Web and the emergence of e-commerce applications and social networks, organizations across the Cloud, share a large amount of data day by day. Secure Data sharing is an important issue over the cloud environment. In order to enhance the security services, the paper proposes Decentralized Cryptography Technique for Secure Communication over the Clouds. In this p...
متن کامل