A Security Leakage Upper Bound Constraint to the Cloud through a Secure and Efficient Secondary Data

Provided by: IJCTT-International Journal of Computer Trends and Technology
Topic: Cloud
Format: PDF
Cloud computing provides considerable storage capacity to the users to deploy their applications without any modification its infrastructure details. Along with that all applications the authors have a large set of intermediate datasets it can generated by the implanted changes in the cloud computing and it is a challenging problem to provide the privacy to these intermediate datasets in the network. After the encryption of all the data sets in the cloud computing it will generate the approaches for the further implementation.

Find By Topic