Effective, Confidentiality and Integrity of Data in Cloud Computing

Vol-4 | Issue-5 | May 2019 | Published Online: 15 May 2019    PDF ( 168 KB )
Author(s)
Praveen Kumar J 1; Dr. Ramalingam Ponnusamy 2

1Research Scholar, Sri Satya Sai University, Sehore M.P. (India)

2Research Guide, Sri Satya Sai University, Sehore M.P. (India)

Abstract

Distributed computing enables clients to store their information remotely. Clients can appreciate cloud applications on-request without the weight of keeping up close to home equipment and overseeing programming. Despite the fact that its focal points are clear, distributed storage expects clients to surrender physical ownership of information, and along these lines, it presents security dangers as to the accuracy of information.

Keywords
network security, image processing.
Statistics
Article View: 535