Loading

A Research on Privacy Preserving for Data I Storage in Cloud Center
K. Kavitha1, M. Punithavalli2

1K. Kavitha, Assistant Professor, Department of Computer Science,  GR. Damodaran College of  Science, Coimbatore, Tamil  Nadu,  India.

2Dr. M. Punithavalli, Professor, Department of  Computer  Applications, Bharathiar University, Coimbatore,  Tamil Nadu,  India.

Manuscript received on 09 August 2019 | Revised Manuscript received on 16 August 2019 | Manuscript Published on 31 August 2019 | PP: 315-320 | Volume-8 Issue-9S2 August 2019 | Retrieval Number: I10650789S219/19©BEIESP DOI: 10.35940/ijitee.I1065.0789S219

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: A cloud computing is an important aspect for transmitting data through internet. Cloud providers provide data through the data centers to the cloud users for the purpose of compute, storage, and network resource demands throughout the world. User of the cloud can utilize the economical advance for data sharing between group members with low maintenance cost. In the meantime, it should provide security assurance for the sharing data files as a result of they are outsourced. unfortunately, due to the regular modification of the membership, distribution of data whereas offering privacy-preserving remains to be a difficult issue, significantly for an un-trusted cloud because of the collusion harass. Moreover, several schemes were projected, the protection of key allocation is predicated on the protected communication passage, however, to own such passage could be a robust assumption and is hard for observe. In this paper we provide numerous approaches for the secure data storage within the cloud.

Keywords: Cloud Computing, Data Storage, Security, Data Center and Survey
Scope of the Article: Security, Privacy and Trust in IoT & IoE