IT UAF CLOUD: A Trusted Storage Architecture for Cloud Computing
DOI:
https://doi.org/10.24203/ajet.v6i6.5572Keywords:
Storage, Online Cloud, Data Protection, Safe storageAbstract
The issue for the understudies and clients to where they need to situate to their records and critical stuff. In this way we attempt to determine this issue by building up an Online Cloud known "It Uaf Cloudâ€. When we say cloud, we have to comprehend that word 'cloud' is a similitude for Internet and along these lines it just means a type of web-based registering. It depends on the model of shared registering assets rather than neighborhood servers, stockpiling gadgets that are utilized to deal with client applications. Cloud accordingly tackle more than what customary methods for registering could accomplish without requiring physical server and capacity frameworks at the area you are in. It has a colossal potential and offer extraordinary preferences clients. Cloud frameworks in a general sense give access to extensive pools of information and computational assets through an assortment of interfaces comparative in soul to existing lattice and HPC asset administration and programming frameworks. These kinds of frameworks offer another programming focus for versatile application engineers and have picked up prevalence in the course of recent years. Nonetheless, most distributed computing frameworks in task today are exclusive, depend upon foundation that is imperceptible to the examination network, or are not unequivocally intended to be instrumented and changed by frameworks specialists. Cloud suppliers hypothetically offer their clients boundless assets for their applications on an on-request premise. In any case, versatility isn't just controlled by the accessible assets, yet in addition by how the control and information stream of the application or administration is outlined and actualized.
References
L.M. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner, 2009, A break in the clouds: towards a cloud definition, SIGCOMM Comput. Commun. Rev., v. 39, n. 1, p. 50-55.
S. Bhardwaj, L. Jain, and S. Jain, ―Cloud Computing: ―Cloud Computing: A Study of Infrastructure as a Service (IaaS),‖ Int‘l J. Eng. and Information Technology, vol. 2, no. 1, 2010, pp. 60–63.
Spoorthy1, M. Mamatha2, B. Santhosh Kumar3cases “A Survey on Data Storage and Security in Cloud Computing†International Journal of Computer Science and Mobile Computing Vol. 3, Issue. 6, June 2014.
Anisha Tandon “Implementing & Developing Cloud Computing on Web Application†International Journal of Computer Science and Mobile Computing Vol. 3, Issue. 2, February 2014.
Santosh Kumar and R. H. Goudar “Cloud Computing – Research Issues, Challenges, Architecture, Platforms and Applications†International Journal of Future Computer and Communication, Vol. 1, No. 4, December 2012.
R. Arokia Paul Rajan, S. Shanmugapriyaa “Evolution of Cloud Storage as Cloud Computing Infrastructure Service†IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 1, Issue 1 (May-June 2012).
Gurudatt Kulkarni, Ramesh Sutar, Jayant Gambhir “Cloud Computing-Storage as Service†International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 1, JanFeb 2012.
Gurudatt Kulkarni, Rani Waghmar, Rajnikant Palwe, Vidya Waykule, HemantBankar, KudilikKoli.â€Cloud Storage Architectureâ€.IEEE International conference on Telecommunication Systems, Services, and Applications (TSSA).
W. Dawoud, I. Takouna, and C. Meinel, “Infrastructure as a Service Security: Challenges and Solutions,†2010 7th International Conference on Informatics and System, March 2010
Liladhar R. Rewatkar & Ujwal A. Lanjewar, Implementation of Cloud Computing on Web Applicationâ€, International Journal of Computer Applications (0975 – 8887) Volume 2 – No.8, June 2010
Sadhana rana, pramod kumar joshi, “ Risk analysis in web applications by using cloud computingâ€, International Journal of Multidisciplinary Research Vol.2 Issue 1, January 2012, ISSN 2231 5780
Christian Vecchiola, Suraj Pandey, and Rajkumar Buyya, “High-Performance Cloud Computing: A View of Scientific Applicationsâ€
Sultan Ullah and Zheng Xuefeng, “ TCLOUD: A Trusted Storage Architecture for Cloud Computingâ€, International Journal of Advanced Science and Technology Vol.63, (2014).
H. Zhuo, S. Zhong and N. Yu, "A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability", IEEE transactions on Knowledge and Data Engineering, vol. 23, no. 9, (2011).
R. G. Ashish and D. M. Bhavsar, "Securing user authentication using single sign-on in Cloud Computing", IEEE Nirma University International Conference on Engineering (NUiCONE), (2011).
E. C. Liu, X. Zhang, J. Chen and C. Yang, "An Authenticated Key Exchange Scheme for Efficient Security Aware Scheduling of Scientific Applications in Cloud Computingâ€, IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing (DASC), (2011).
Downloads
Published
Issue
Section
License
- Papers must be submitted on the understanding that they have not been published elsewhere (except in the form of an abstract or as part of a published lecture, review, or thesis) and are not currently under consideration by another journal published by any other publisher.
- It is also the authors responsibility to ensure that the articles emanating from a particular source are submitted with the necessary approval.
- The authors warrant that the paper is original and that he/she is the author of the paper, except for material that is clearly identified as to its original source, with permission notices from the copyright owners where required.
- The authors ensure that all the references carefully and they are accurate in the text as well as in the list of references (and vice versa).
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Attribution-NonCommercial 4.0 International that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
- The journal/publisher is not responsible for subsequent uses of the work. It is the author's responsibility to bring an infringement action if so desired by the author.