Open Access Open Access  Restricted Access Subscription or Fee Access

Privacy Preserving Cloud Data Access using Control and Automation Technique

Sachin kumar

Abstract


At gift the mankind are steadily relying extra on some of online garage stores to again up our
records or for the use of it in real time which gives an anywhere, anytime get admission to.
These kinds of services convey with it, worries of safety and privacy weaknesses for all of the
services supplied via them for the reason that customers statistics are stored and maintained
out of user’s premises. This paper portrays the various troubles associated to privacy even as
storing the User’s statistics on one-third celebration provider vendors, that's extra typically
termed as cloud Service. Without suitable protection and privateness solutions designed for
clouds this computing paradigm should become a huge failure. There is a lot of studies being
made to spot out the issues with those cloud service companies and cloud security in trendy.
This paper is on regard of one of the key trouble-privacy that occur inside the context of
Cloud computing and examine the numerous works being carried out to solve the problems in
privateness and thus to make sure privacy to outsourced statistics on cloud garage.


Keywords: Automation technique, cloud computing, cloud server, feasibility, software, threat
model.


Full Text:

PDF

References


D. Agrawal, A. El Abbadi, F. Emekci and

A. Metwally. Database Management as a

Service: Challenges and Opportunities,

Data Engineering, 2009. ICDE '09. IEEE

th International Conference on, 2009,

pp. 1709–1716.

S. Akioka and Y. Muraoka, HPC

benchmarks on Amazon EC2, IEEE, 2010,

pp. 1029–1034.

M. A. AlZain and E. Pardede, Using Multi

Shares for Ensuring Privacy in Database-

as-a-Service, 2011 44th Hawaii

International Conference on System

Sciences (HICSS), 2011, pp. 1–9.

B. Aljaber, T. Jacobs, K. Nadiminti, and

R. Buyya, Multimedia on global grids: A

case study in distributed ray tracing,

Malays. J. Comput. Sci., vol. 20, no. 1, pp.

, June 2007.

Farhan Bashir Shaikh, Sajjad Haider

Security Threats in Cloud Computing,6th

International Conference on Internet

Technology and secured Transaction,

UAE

Liang-Teh Lee, Kang-Yuan Liu, Hui-

Yang Huang and Chia-Ying Tseng. A

Dynamic Resource anagement with

Energy Saving Mechanism for Supporting

Cloud Computing. International Journal of

Grid and Distributed Computing Vol. 6,

No. 1, February, 2013.

Core Servlets and JSP. Vol. 1, Hall &

Brown (2nd Edition).

Core Java 2 Volume 1, Fundamentals Cay

S. Horstmann, Gary Cornell

Core Java 2 Volume 2, Advanced Features

Cay S. Horstmann, Gary Cornell

Complete Reference for J2EE 5th Edition.




DOI: https://doi.org/10.37591/jovdtt.v10i1.3904

Refbacks

  • There are currently no refbacks.


Copyright (c) 2020 Journal of VLSI Design Tools & Technology



eISSN: 2249–474X