[PDF][PDF] Survey on data security in multi-cloud environment

DIG Amalarathinam, JM Priya - International Journal of Pure and …, 2018 - researchgate.net
Cloud computing is sharing various computing resources rather than having local servers or
personal devices to handle applications over internet. There are different types of cloud …

Comparative analysis of some efficient data security methods among cryptographic techniques for cloud data security

MAT Abubakar, A Aloysius, Z Umar, M Dauda - Nigerian Journal of Basic …, 2019 - ajol.info
The concept of cloud computing model is to grant users access to outsource data from the
cloud server without them having to worry about aspects of the hardware and software …

[PDF][PDF] A Novel Authentication Technique for Cloud Data Storage Security

CS Dule, KM Rajasekharaiah - Computer Science, Technology …, 2022 - researchgate.net
New computing model in information technology which is coined as” Cloud Computing “is
widely used for information sharing and resource utilization. Due to the cost reduction for …

OVERSIGHT CRYPTO-VIRTUAL STORAGE APPLICATION.

B Mbenji, G GLORINDAL - i-Manager's Journal on Digital …, 2023 - search.ebscohost.com
Abstract The Oversight Crypto-Virtual Storage application is designed as a virtual storage
solution aimed at curtailing crimes involving data, such as data theft and tampering. The …

Security Enhancement in Cloud Networks By Neoteric Techniques.

T Bazaz - International Journal of Advanced Research in …, 2017 - search.ebscohost.com
Cloud computing paradigm is a platform that helps the geographically distributed users to
access outsourced data without much hardware and software requirements. With the …

[PDF][PDF] SECURITY VIOLATION MANAGEMENT IN CLOUD BASED E-COMMERCE NETWORK USING PROCEDURAL SERVICE TAGGING TECHNIQUE

C Mbachu, KC Okafor - 2015 - researchgate.net
E-Commerce platform represents a computation environment for myriads of web buying and
selling transactions on demand. Interestingly, the system architecture for e-commerce …

[引用][C] Design and analysis of efficient algorithms for cloud data storage and security management in cloud computing

P GL - 2018 - UPES, Dehradun