Keywords:-

Keywords: active storage, cloud computing, cloud service providers, cryptographic techniques, data confidentiality, self-destruction data system.

Article Content:-

Abstract

Advancement of cloud innovation and normal use of portable Internet has turned out to be exceptionally basic in today's quick moving world where individuals are subjected to post their own data like record numbers, passwords, notes, and diverse basic information. This data are reserved, duplicated, and documented by Cloud Service Providers (CSPs), normally for clients' approval and administration. There are high risks for the information to fall into wrong side use where it could be gotten to unlawfully without the clients' learning. In such circumstances security for the information on cloud must be expanded. Selfdestructing data primarily goes for securing the clients' information secrecy. All the information and their duplicates get to be destructed or indistinct after a client determined time, with no intercession from the client part. SeDas framework meets this test by another blend of cryptographic methods and dynamic stockpiling system in light of T10 OSD standard. These security systems and its functionalities verify that SeDas meets all protection safeguarding strategies and is simple for useful utilization. Contrasted with the framework without SeDas the execution for transferring/downloading records has been accomplished better.

References:-

References

Tan Zhipeng ; Wuhan Nat. Lab. for Optoelectron., Huazhong Univ. Sci. & Technol., Wuhan, China ;

Yuan Yanli ; Zhan Tian ; XieYulai, “MO_AOBS: Researches of method object in active objectbased

storage systems”, Published in: Computer Science and Network Technology (ICCSNT), 2011

International Conference on (Volume:2 ) Date of Conference: 24-26 Dec. 2011 Page(s): 1175 –

Chao Chen ; Dept. of Comput. Sci., Texas Tech Univ., Lubbock, TX, USA ; Yong Chen ; Roth, P.C.

“DOSAS: Mitigating the Resource Contention in Active Storage Systems”, Published in:Cluster

Computing (CLUSTER), 2012 IEEE International Conference onDate of Conference:24-28 Sept.

Page(s):164 – 172.

Chao Chen ; Dept. of Comput. Sci., Texas Tech Univ. Lubbock, Lubbock, TX, USA ; Yong Chen,

“Dynamic Active Storage for High Performance I/O”, Published in:Parallel Processing (ICPP), 2012

st International Conference onDate of Conference:10-13 Sept. 2012Page(s):379 – 388.

Zhipeng Tan ; Wuhan Nat. Lab. for Optoelectron., Huazhong Univ. of Sci. & Technol., Wuhan,

China ; Yanli Yuan ; Dan Feng ; Tian Zhan, “Implementation of method object in active objectbased

storage systems”, Published in:Cloud Computing and Intelligence Systems (CCIS), 2011 IEEE

International Conference onDate of Conference:15-17 Sept. 2011Page(s):204 – 211. 5. Almorsy, M. ;Comput. Sci. & Software Eng., Swinburne Univ. of Technol., Hawthorn, VIC,

Australia ; Grundy, John ; Ibrahim, A.S., “Collaboration-Based Cloud Computing Security

Management Framework”, Published in:Cloud Computing (CLOUD), 2011 IEEE International

Conference onDate of Conference:4-9 July 2011Page(s):364 – 371.

Zehua Zhang ; Sch. of Inf. Sci. & Eng., Yunnan Univ., Kunming, China ; Xuejie Zhang, “Realization

of open cloud computing federation based on mobile agent”, Published in:Intelligent Computing and

Intelligent Systems, 2009. ICIS 2009. IEEE International Conference on (Volume:3 )Date of

Conference:20-22 Nov. 2009Page(s):642 – 646.

Wang En Dong ; State Key Lab. of High-end Server & Storage Technol., Beijing, China ; Wu Nan ;

Li Xu, “QoS-Oriented Monitoring Model of Cloud Computing Resources Availability”, Published

in:Computational and Information Sciences (ICCIS), 2013 Fifth International Conference onDate of

Conference:21-23 June 2013Page(s):1537 – 1540.

Downloads

Citation Tools

How to Cite
Rajkumar, V., & Mala, D. R. (2015). Spell Measured Cloud Location with Self Destructing Data Structure for Data Secrecy. International Journal Of Mathematics And Computer Research, 3(08), 1124-1132. Retrieved from http://ijmcr.in/index.php/ijmcr/article/view/134