Reconfigures Protected Protocols for Advanced Cloud Computing

Authors

  • Mohammed Inamur Rahman  Department of Computer Science & Engineering, College of Sciences & Arts, Dhahran Al Janub King Khalid University, Abha, Dharan Al Janub Campus
  • Shamimul Qamar  Department of Computer Science & Engineering, College of Sciences & Arts, Dhahran Al Janub King Khalid University, Abha, Dharan Al Janub Campus
  • Abdulilah G.F Saif  Department of Computer Science & Engineering, College of Sciences & Arts, Dhahran Al Janub King Khalid University, Abha, Dharan Al Janub Campus
  • Abdul Azeem  Research Scholar, Department of Electrical Engineering, Jamia Millia Islamia University, New Delhi, India

DOI:

https://doi.org//10.32628/CSEIT22828

Keywords:

Cloud Computing, Trusted Storage, and Security

Abstract

Cloud computing is a term which used to depict both a stage and kind of utilization. Cloud computing varies from customary registering ideal models as it is adaptable, can be embodied as a conceptual these elements which gives us diverse level of administrations to the customers, driven by economies of scale and the administrations are progressively configurable. Information put away in outsider stockpiling frameworks like the cloud probably won't be secure since classification and honesty of information are not ensured. In spite of the fact that distributed computing gives savvy stockpiling administrations. Subsequently, numerous associations and clients may not utilize the cloud administrations to store their information in the cloud until the point that specific security ensures are made. In this paper, an answer for the issue of safely putting away the customer's information by keeping up the privacy and trustworthiness of the information inside the cloud is produced. The proposed conventions are created which guarantee that the customer's information is put away just on confided away servers, reproduced just on confided away servers, and certification that the information proprietors and other favored clients of that information get to the information safely.

References

  1. Muhammad Aufeef Chauhan and Muhammad Ali Babar, “Migrating Service-Oriented System to Cloud Computing: An Experience Report”, 2011 IEEE 4th International Conference on Cloud Computing, pp 404-411.
  2. Louridas, P., Up in the Air: Moving Your Applications to the Cloud. Software, IEEE, 2010. 27(4): p. 6-11.
  3. Ali Babar, M., Chauhan, M. A., A Tale of Migration to Cloud Computing for Sharing Experiences and Observations, SECLOUD workshop, Collocated with ICSE 2011, Hawaii, USA.
  4. Rajkumar Buyyaa, Chee Shin Yeoa, Srikumar Venugopala, James Broberga, and Ivona Brandicc, “Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility”, Future Generation Computer Systems, Volume 25, Issue 6, June2009, Pp 599-616.
  5. K. Keahey and T. Freeman, “Science Clouds: Early Experiences in Cloud Computing for Scientific Applications,” in proceedings of Cloud Computing and Its Applications 2008, Chicago, IL. 2008.
  6. Junjie Peng, Xuejun Zhang, and Zhou Lei, Bofeng Zhang, Wu Zhang, Qing Li, “Comparison of Several Cloud Computing Platforms”, Second International Symposium on Information Science and Engineering, IEEE 2009, pp 23-27.
  7. Ommeren, E. V., Duivestein, S., deVadoss, J,Reijnen, C. & Gunvaldson, E. Collaboration in the Cloud. Microsoft and Sogeti, Bariet, Ruinen, theNetherlands, 2009.
  8. Oram, A. “Cloud computing perspectives and questions at the World Economic Forum,” WikiContent, 2009. Accessed January 20, 2011

Downloads

Published

2022-04-30

Issue

Section

Research Articles

How to Cite

[1]
Mohammed Inamur Rahman, Shamimul Qamar, Abdulilah G.F Saif, Abdul Azeem, " Reconfigures Protected Protocols for Advanced Cloud Computing, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 8, Issue 2, pp.34-43, March-April-2022. Available at doi : https://doi.org/10.32628/CSEIT22828