A Balanced Secured Cloud Storage Model for Improving Accessing Efficiency of Data from Cloud System

Abstract

Cloud Computing has attracted several enterprises due to various benefits that newlineit offers in the form of more excellent resiliency, faster deployment, low costs newlineor pay per usage, on-demand security control, and system tampering detection. newlineMomentarily, Cloud computing is effectively changing the way businesses and newlineinteractions are used to conduct with society. Earlier hardware and software newlineused to reside only at a user computer, which allowed users to access data and newlineprograms from within their networks. Today, with advanced cloud computing newlinetechnologies, users can access data outside their computing environment. newlineAnalogous description of cloud computing states that a user today can access newlinestorage and data on a rent basis from a cloud service provider (via the Internet) newlineinstead of buying their infrastructure. newlineCloud computing can also be defined as private cloud, community cloud, newlinepublic cloud, and hybrid cloud. A cloud technology where the owner newlinemaintains the infrastructure and services is known as a private cloud, whereas newlinea community cloud is where multiple organizations get access to a shared newlinecloud server with similar security configurations. Similarly, the maintenance newlineand access off-site storage of services via the Internet comes under the Public newlinecloud. External cloud service providers support storage, for example, Amazon newlineWeb Services, Microsoft Azure, and Google Cloud Platform. A hybrid cloud newlinemodel is one that takes advantage of both private and public cloud models. For newlineexample, a user can utilize public cloud services for ample email storage, newlinewhich can prevent high costs, and at the same time, it can use the private cloud newlinefor storing highly confidential data. newlineWidespread adoption of cloud computing is restricted by several deterrents, newlineincluding reliability, data security, performance, efficiency, and privacy newlineissues. newlineSolving some of the Cloud Computing issues is the aim of this research. newlineInitially, the author proposed a Trusted Virtual Data Centre (TVDC) which newlinewill effectively recognise malicious and non-malicious

Description

Keywords

Citation

item.page.endorsement

item.page.review

item.page.supplemented

item.page.referenced