Secured multi-tenancy approval for data storage in cloud

Authors

  • Dinesh NT Student, Dept. of Computer Application, GKM College of Engineering and Technology Tamil Nadu, India
  • Devi AS Asst. Professor, Dept. of Computer Application, GKM College of Engineering & Technology, Tamil Nadu, India

Keywords:

Security, Authentication, Cloud Computing

Abstract

Cloud Computing is a general term for delivery of hosted services over the internet. Cloud organization and institutions are increasingly driven to cloud computing as a way to increase functionality, lower cost and enhance convenience to user by making the service and resource availability anywhere there is an internet connection. With cloud computing, user have readily available a suite of application, feature, and infrastructure that would normally require significant investment if provide in the traditional in house computing environment.

References

. Yashpal Kadam, “Security Issues in Cloud Computing A Transparent View”, International Journal of Computer Science Emerging Technology, Vol-2 No 5 October, 2011 , 316-322 .

. [2] Z. Wang, “Security and Privacy Issues Within Cloud Computing” IEEE Int. conference on computational information sciences, Chengdu, China, Oct. 2011.

. Mathisen, “Security Challenges and Solutions in Cloud Computing” 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST2011) , Daejeon, Korea, 31 May -3 June 2011.

. Mohamed Al Morsy, John Grundy, Ingo Müller, “An Analysis of The Cloud Computing Security Problem,” in Proceedingsof APSEC 2010 Cloud Workshop, Sydney, Australia, 30th Nov 2010.

. Yanpei Chen, Vern Paxson, Randy H. Katz, “What's New About Cloud Computing Security?” Technical Report No. UCB/EECS-2010-5.http://www.eecs.berkeley.edu/Pubs/TechRpts/2010/EECS-2010-5.html

Downloads

Published

2024-02-26

How to Cite

Dinesh, N., & Devi, A. (2024). Secured multi-tenancy approval for data storage in cloud. COMPUSOFT: An International Journal of Advanced Computer Technology, 4(06), 1837–1840. Retrieved from https://ijact.in/index.php/j/article/view/321

Issue

Section

Original Research Article

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.