Abstract:The end of this decade is marked by a paradigm shift of the industrial information technology towards a pay-per-use service business model known as cloud computing. Cloud data storage redefines the security issues targeted on customer's outsourced data (data that is not stored/retrieved from the costumers own servers). In this work we observed that, from a customer's point of view, relying upon a solo for his outsourced data is not very promising. In addition, providing better privacy as well as ensuring data … Show more
“…In FRS the essential data onto cloud [77] is splits and allocates in to various fragments of storage in servers. The fragment has not any useful information about the data so risk of data theft is minimized in this scenario.…”
Abstract-Internet of Things referred as a pervasive network architecture which provides services to the physical world by processing and analyzing data. In this modern era Internet of Things has been shown much significance and rapidly developing by connecting heterogeneous devices with various technologies. By this way interconnectivity of large number of electronic devices connected with the IoT network leads the risk of security and confidentiality of data. This paper analyzes different security issues, their counter measures and discusses the future directions of security in IoT. Furthermore, this paper also discusses essential technologies of security like encryption in the scenario of IoT for the prevention of harmful threats in the light of latest research.
“…In FRS the essential data onto cloud [77] is splits and allocates in to various fragments of storage in servers. The fragment has not any useful information about the data so risk of data theft is minimized in this scenario.…”
Abstract-Internet of Things referred as a pervasive network architecture which provides services to the physical world by processing and analyzing data. In this modern era Internet of Things has been shown much significance and rapidly developing by connecting heterogeneous devices with various technologies. By this way interconnectivity of large number of electronic devices connected with the IoT network leads the risk of security and confidentiality of data. This paper analyzes different security issues, their counter measures and discusses the future directions of security in IoT. Furthermore, this paper also discusses essential technologies of security like encryption in the scenario of IoT for the prevention of harmful threats in the light of latest research.
“…The model also provides trust relationship among multiple cloud providers. A unique cost effective and secure model of data distribution is proposed for multi -cloud storage by the authors in [19]. The main idea behind this model is to provide a low cost mechanism of user's data distribution of on available multiple cloud storage providers…”
“…Yashaswi Singh, Farah Kandal and Weiyi Zhang [1] proposes about a Secured Cost Effective MultiCloud Storage in Cloud Computing which seeks to provide each customer with a better cloud data storage decision taking into consideration the user budget as well as providing him the best quality of service offered by available CSP.…”
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.