Nested Testimony Model to Access Cloud Data

Provided by: International Journal of Advanced Research in Computer Science & Technology (IJARCST)
Topic: Cloud
Format: PDF
In the era of Internet, people are continuously relying on online file storage system to back up their data. As they are demanding more online storage, they are also inviting some security breaches. This online storage has emerged as a utility computing known as the cloud computing. This is a concept of remote access of the system which consequently results in the least use of client's resource for computation or storage. There are various algorithms and methods available for securing data over the cloud. In this paper, the authors seek to explain the current research associated to data security like integrity and confidentiality. Precisely, the paper focuses on securing client in the cloud services.

Find By Topic