IT UAF CLOUD: A Trusted Storage Architecture for Cloud Computing

Authors

  • Hafiza Mahrukh Shahzadi Graduate student, Department of Computer Sciences, Government Collage Women University Faisalabad
  • Shazia Riaz

DOI:

https://doi.org/10.24203/ajet.v6i6.5572

Keywords:

Storage, Online Cloud, Data Protection, Safe storage

Abstract

The issue for the understudies and clients to where they need to situate to their records and critical stuff. In this way we attempt to determine this issue by building up an Online Cloud known "It Uaf Cloudâ€. When we say cloud, we have to comprehend that word 'cloud' is a similitude for Internet and along these lines it just means a type of web-based registering. It depends on the model of shared registering assets rather than neighborhood servers, stockpiling gadgets that are utilized to deal with client applications. Cloud accordingly tackle more than what customary methods for registering could accomplish without requiring physical server and capacity frameworks at the area you are in. It has a colossal potential and offer extraordinary preferences clients. Cloud frameworks in a general sense give access to extensive pools of information and computational assets through an assortment of interfaces comparative in soul to existing lattice and HPC asset administration and programming frameworks. These kinds of frameworks offer another programming focus for versatile application engineers and have picked up prevalence in the course of recent years. Nonetheless, most distributed computing frameworks in task today are exclusive, depend upon foundation that is imperceptible to the examination network, or are not unequivocally intended to be instrumented and changed by frameworks specialists. Cloud suppliers hypothetically offer their clients boundless assets for their applications on an on-request premise. In any case, versatility isn't just controlled by the accessible assets, yet in addition by how the control and information stream of the application or administration is outlined and actualized.

References

L.M. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner, 2009, A break in the clouds: towards a cloud definition, SIGCOMM Comput. Commun. Rev., v. 39, n. 1, p. 50-55.

S. Bhardwaj, L. Jain, and S. Jain, ―Cloud Computing: ―Cloud Computing: A Study of Infrastructure as a Service (IaaS),‖ Int‘l J. Eng. and Information Technology, vol. 2, no. 1, 2010, pp. 60–63.

Spoorthy1, M. Mamatha2, B. Santhosh Kumar3cases “A Survey on Data Storage and Security in Cloud Computing†International Journal of Computer Science and Mobile Computing Vol. 3, Issue. 6, June 2014.

Anisha Tandon “Implementing & Developing Cloud Computing on Web Application†International Journal of Computer Science and Mobile Computing Vol. 3, Issue. 2, February 2014.

Santosh Kumar and R. H. Goudar “Cloud Computing – Research Issues, Challenges, Architecture, Platforms and Applications†International Journal of Future Computer and Communication, Vol. 1, No. 4, December 2012.

R. Arokia Paul Rajan, S. Shanmugapriyaa “Evolution of Cloud Storage as Cloud Computing Infrastructure Service†IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 1, Issue 1 (May-June 2012).

Gurudatt Kulkarni, Ramesh Sutar, Jayant Gambhir “Cloud Computing-Storage as Service†International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 1, JanFeb 2012.

Gurudatt Kulkarni, Rani Waghmar, Rajnikant Palwe, Vidya Waykule, HemantBankar, KudilikKoli.â€Cloud Storage Architectureâ€.IEEE International conference on Telecommunication Systems, Services, and Applications (TSSA).

W. Dawoud, I. Takouna, and C. Meinel, “Infrastructure as a Service Security: Challenges and Solutions,†2010 7th International Conference on Informatics and System, March 2010

Liladhar R. Rewatkar & Ujwal A. Lanjewar, Implementation of Cloud Computing on Web Applicationâ€, International Journal of Computer Applications (0975 – 8887) Volume 2 – No.8, June 2010

Sadhana rana, pramod kumar joshi, “ Risk analysis in web applications by using cloud computingâ€, International Journal of Multidisciplinary Research Vol.2 Issue 1, January 2012, ISSN 2231 5780

Christian Vecchiola, Suraj Pandey, and Rajkumar Buyya, “High-Performance Cloud Computing: A View of Scientific Applicationsâ€

Sultan Ullah and Zheng Xuefeng, “ TCLOUD: A Trusted Storage Architecture for Cloud Computingâ€, International Journal of Advanced Science and Technology Vol.63, (2014).

H. Zhuo, S. Zhong and N. Yu, "A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability", IEEE transactions on Knowledge and Data Engineering, vol. 23, no. 9, (2011).

R. G. Ashish and D. M. Bhavsar, "Securing user authentication using single sign-on in Cloud Computing", IEEE Nirma University International Conference on Engineering (NUiCONE), (2011).

E. C. Liu, X. Zhang, J. Chen and C. Yang, "An Authenticated Key Exchange Scheme for Efficient Security Aware Scheduling of Scientific Applications in Cloud Computingâ€, IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing (DASC), (2011).

Downloads

Published

2018-12-19

How to Cite

Shahzadi, H. M., & Riaz, S. (2018). IT UAF CLOUD: A Trusted Storage Architecture for Cloud Computing. Asian Journal of Engineering and Technology, 6(6). https://doi.org/10.24203/ajet.v6i6.5572