DECIMAL ATTRIBUTE BASED ENCRYPTION IN CLOUD SERVER
Keywords:
scalable, isolation, infrastructureAbstract
This Research presents a comparative study of DECIMAL ATTRIBUTE BASED ENCRYPTION in cloud server and the security issues associated with those systems. In today’s networked world, computers rarely work in isolation. They collaborate with each other for the purpose of communication, processing, data transfer, storage etc., when systems work in this collaborative fashion with other systems that are geographically scattered over wide distance it is commonly known as a distributed system. In literature, researchers have used diverse definitions to outline what a distributed system is Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure and economical. The motivation for cloud computing was initially driven by large scale resource intensive government application, that require more computational, network and storage resources then a single computer, cloud provides in a single administrative domain. Cloud computing is a computing paradigm, where a large pool of systems are connected in private or public networks, to provide dynamically scalable infrastructure for application, data and file storage at low cost.
References
.leenerP traB , ASR eht ta kcarT ’srehpargotpyrC ehT“
”ecnerefnoc, 2005, retupmoc ni seton erutceL
ecneicS3376 ,springer-Verlag ,pp .29-43 ,extended version :http//:eprint .iacr.org/2004/222 ./
.]Ilango Sriram ,”Distributed ,Parallel and Cluster computin”g, 2009, aSimulation Tool Exploring Cloud-Scale Data Centres, In: CloudCom 2009, LNCS 5931, pp. 381-392, 2009
.]S ,esevoneG erotava”Akamai Introduces Cloud-Based Firewall Provides a scalable edge defense system for blocking Web application attacks in the cloud”, 2009. http://cloudcomputing.sys-con.com/node/1219023.
ecnarg miT dna llim reteP .], “The NIST Definition of Cloud Computing”, 2011, National Institute of Standards and Technology ,Gaitherbsburg,MD 20899-8930, noitacilbuP laicepS TSIN800-145.
remsseM nellE .], “New security demands arising for virtualization, cloud computing”, 2011, http://www.networkworld.com/article/2178628/virtualization/gartner--new-security-demands-arising-for-virtualization--cloud-computing.html
.]SumedhaKaushik dnaAnkurSinghal ,”Network Security Using Cryptographic Techniques ”2012 ,
volume 2, eussI12.
. Charles Miers, Fernando Redigolo dna Marcos Simplicio ,”A quantitative analysis of current security concerns and solutions for cloud computing“ , 2012 , Journal of Cloud Computing: Advances, Systems and Applications doi:10.1186/2192-113X-1-11 The electronic version of this article is the complete one and can be found online at:http://www.journalofcloudcomputing.com/content/1/1/11 ]
[. Rabi Prasad Padhay, ”An Enterprise Cloud Model for Optimizing IT Infrastructure“ , 2012 , International Journal of Cloud Computing and Services Science (IJ-CLOSER) Vol.1, No.3, pp. 123~133 ISSN: 2089-3337ttp://iaesjournal.com/online/index.php/ IJ-CLOSER
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2016 International Journal for Research Publication and Seminar
This work is licensed under a Creative Commons Attribution 4.0 International License.
Re-users must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. This license allows for redistribution, commercial and non-commercial, as long as the original work is properly credited.