International Journal of Advance Computational Engineering and Networking (IJACEN)
Follow Us On :
current issues
Volume-12,Issue-4  ( Apr, 2024 )
Past issues
  1. Volume-12,Issue-3  ( Mar, 2024 )
  2. Volume-12,Issue-2  ( Feb, 2024 )
  3. Volume-12,Issue-1  ( Jan, 2024 )
  4. Volume-11,Issue-12  ( Dec, 2023 )
  5. Volume-11,Issue-11  ( Nov, 2023 )
  6. Volume-11,Issue-10  ( Oct, 2023 )
  7. Volume-11,Issue-9  ( Sep, 2023 )
  8. Volume-11,Issue-8  ( Aug, 2023 )
  9. Volume-11,Issue-7  ( Jul, 2023 )
  10. Volume-11,Issue-6  ( Jun, 2023 )

Statistics report
Jul. 2024
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 136
Paper Published : 1596
No. of Authors : 4179
  Journal Paper

Paper Title :
Efficient Distributed Accountability And Data Sharing In The Cloud

Author :C.Venkata Raviteja, C.V.Lakshminarayana

Article Citation :C.Venkata Raviteja ,C.V.Lakshminarayana , (2014 ) " Efficient Distributed Accountability And Data Sharing In The Cloud " , International Journal of Advance Computational Engineering and Networking (IJACEN) , pp. 01-04, Volume-2,Issue-1

Abstract : Abstract— In cloud computing environment resources are shared among various clients and it's important for system provider to allocate the necessary resources for the clients. And IT infrastructure proceeds as the amount increases to grow, cloud computing is a new way of virtualization technologies that enable management of virtual machines over a plethora of physically connected systems. Cloud computing provides on demand services. Multiple users need to try and do business of their information exploitation cloud however they get worry to losing their information. Whereas data owner can store his/her information on cloud, he should get confirmation that his/her information is safe on cloud. To unravel higher than downside during this paper this offers effective mechanism to trace usage of information exploitation accountability. Accountability is verification of security policies and it's necessary for clear information access. This implementation shows automatic work mechanisms exploitation JAR programming that improves security and privacy of information in cloud. We provide an effective mechanism known as fog computing to protect user’s data from theft by confusing attacker with un useful information. Exploitation this mechanism data owner might apprehend his/her information is handled as per his demand or service level agreement.

Type : Research paper

Published : Volume-2,Issue-1


Copyright: © Institute of Research and Journals

| PDF |
Viewed - 47
| Published on 2014-02-13
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World