z-logo
open-access-imgOpen Access
Emphasize the Cloud Security Using Various Substitution Techniques
Publication year - 2019
Publication title -
international journal of recent technology and engineering
Language(s) - English
Resource type - Journals
ISSN - 2277-3878
DOI - 10.35940/ijrte.b1475.0982s1119
Subject(s) - cloud computing , laptop , server , computer security , cloud server , computer science , cloud computing security , installation , internet privacy , database , world wide web , operating system
Cloud computing is the technology used for storing the Information and packages on faraway servers and accessing them through the net rather than saving or installing them to your non-public or office pc. The time period cloud is used because information and programs are saved on a cloud or collection of web servers and computers owned by a third party. Most issues start from the fact that the person loses manipulate of his or her records, because it's miles stored on a laptop belonging to a person else (the cloud provider). Cloud Computing affords a platform with an superior and efficient way to store statistics inside the cloud. The functioning of Cloud Computing is significantly distressed with the aid of problems including that of statistics safety, integrity, theft, loss and presence of inflamed applications. These troubles are the important dangers to the consumer to transport their statistics to the cloud. we have analyzed various Substitution techniques to attain high level of security to cloud storage.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here