A Balanced Secured Cloud Storage Model for Improving Accessing Efficiency of Data from Cloud System
Loading...
Date
item.page.authors
Journal Title
Journal ISSN
Volume Title
Publisher
Abstract
Cloud Computing has attracted several enterprises due to various benefits that
newlineit offers in the form of more excellent resiliency, faster deployment, low costs
newlineor pay per usage, on-demand security control, and system tampering detection.
newlineMomentarily, Cloud computing is effectively changing the way businesses and
newlineinteractions are used to conduct with society. Earlier hardware and software
newlineused to reside only at a user computer, which allowed users to access data and
newlineprograms from within their networks. Today, with advanced cloud computing
newlinetechnologies, users can access data outside their computing environment.
newlineAnalogous description of cloud computing states that a user today can access
newlinestorage and data on a rent basis from a cloud service provider (via the Internet)
newlineinstead of buying their infrastructure.
newlineCloud computing can also be defined as private cloud, community cloud,
newlinepublic cloud, and hybrid cloud. A cloud technology where the owner
newlinemaintains the infrastructure and services is known as a private cloud, whereas
newlinea community cloud is where multiple organizations get access to a shared
newlinecloud server with similar security configurations. Similarly, the maintenance
newlineand access off-site storage of services via the Internet comes under the Public
newlinecloud. External cloud service providers support storage, for example, Amazon
newlineWeb Services, Microsoft Azure, and Google Cloud Platform. A hybrid cloud
newlinemodel is one that takes advantage of both private and public cloud models. For
newlineexample, a user can utilize public cloud services for ample email storage,
newlinewhich can prevent high costs, and at the same time, it can use the private cloud
newlinefor storing highly confidential data.
newlineWidespread adoption of cloud computing is restricted by several deterrents,
newlineincluding reliability, data security, performance, efficiency, and privacy
newlineissues.
newlineSolving some of the Cloud Computing issues is the aim of this research.
newlineInitially, the author proposed a Trusted Virtual Data Centre (TVDC) which
newlinewill effectively recognise malicious and non-malicious