Home > Computer Science > Other > Volume-2 > Issue-4 > Cloud Computing Adoption Approach towards Securing Data in Cloud Computing

Cloud Computing Adoption Approach towards Securing Data in Cloud Computing

Call for Papers

Volume-8 | Advancing Multidisciplinary Research and Analysis - Exploring Innovations

Last date : 28-Mar-2024

Best International Journal
Open Access | Peer Reviewed | Best International Journal | Indexing & IF | 24*7 Support | Dedicated Qualified Team | Rapid Publication Process | International Editor, Reviewer Board | Attractive User Interface with Easy Navigation

Journal Type : Open Access

First Update : Within 7 Days after submittion

Submit Paper Online

For Author

Research Area


Cloud Computing Adoption Approach towards Securing Data in Cloud Computing


P. Anjaneyulu | Mr. S. Srinivasa Reddy

https://doi.org/10.31142/ijtsrd12995



P. Anjaneyulu | Mr. S. Srinivasa Reddy "Cloud Computing Adoption Approach towards Securing Data in Cloud Computing" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-4, June 2018, pp.390-393, URL: https://www.ijtsrd.com/papers/ijtsrd12995.pdf

Present or late investigation on cloud security communicates that the security of customers' data has the most astonishing need and furthermore concern. Customers store colossal measures of delicate data on a cloud. Sharing sensitive data will empower attempts to reduce the cost of giving customers redid advantages and offer some motivating force included data organizations. Regardless, secure data sharing is risky. Security is a champion among the most troublesome errand to realize in cloud computing. Assorted sorts of strikes in the application side and in the gear parts. This paper proposes a framework for secure delicate data sharing in cloud, including secure information development, aggregating, use, and obliteration on a semi-confided in cloud condition. We trust this must be able to accomplish with an approach that is think, adoptable and all around formed. This paper elucidates the audit, strategy for thinking and parts in the Cloud Computing Adoption Framework (CCAF) to guarantee data security. CCAF is appeared by the system design in perspective of the necessities and the execution showed by the CCAF multi-layered security. We propose an answer in light of developing needs to upgrade current Cloud security, Fine Grained Security Model (FGSM) which is planned to facilitate three particular sorts of security systems and offer multi-layered security for a prevalent data affirmation. Since our Server cultivate has 10peta bytes of data, there is a colossal errand to give nonstop protection and seclude. In this paper discussed the secure hash algorithm (SHA) made by the National Security Agency (NSA) as SHA-0 and later offered over to the National institute of Standards and technology (NIST). SHA is a hash work that takes a variable length input message and makes a settled length yield message called the hash or the message procedure of the principal message. The paper in like manner conveys the delayed consequences of execution of the SHA algorithm. The SHA algorithm is of particular centrality because of its usage with the Digital Signature Algorithm (DSA) for advanced marks. We utilize Business Process Modeling Notation (BPMN) to reproduce how information is being used. The utilization of BPMN re-approval or entertainment engages us to review the picked security appears before true blue execution.

CCAF, FGSM, BPMN, Cloud Security, SHA Algorithm with Hash function


IJTSRD12995
Volume-2 | Issue-4, June 2018
390-393
IJTSRD | www.ijtsrd.com | E-ISSN 2456-6470
Copyright © 2019 by author(s) and International Journal of Trend in Scientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0)

International Journal of Trend in Scientific Research and Development - IJTSRD having online ISSN 2456-6470. IJTSRD is a leading Open Access, Peer-Reviewed International Journal which provides rapid publication of your research articles and aims to promote the theory and practice along with knowledge sharing between researchers, developers, engineers, students, and practitioners working in and around the world in many areas like Sciences, Technology, Innovation, Engineering, Agriculture, Management and many more and it is recommended by all Universities, review articles and short communications in all subjects. IJTSRD running an International Journal who are proving quality publication of peer reviewed and refereed international journals from diverse fields that emphasizes new research, development and their applications. IJTSRD provides an online access to exchange your research work, technical notes & surveying results among professionals throughout the world in e-journals. IJTSRD is a fastest growing and dynamic professional organization. The aim of this organization is to provide access not only to world class research resources, but through its professionals aim to bring in a significant transformation in the real of open access journals and online publishing.

Thomson Reuters
Google Scholer
Academia.edu

ResearchBib
Scribd.com
archive

PdfSR
issuu
Slideshare

WorldJournalAlerts
Twitter
Linkedin