A Computational and Analytical Approcach For Cloud
A Computational and Analytical Approcach For Cloud
Technology: Java
Objective
The main aim of our project is covered data security, data management and efficient resource
sharing mechanism. Here we are providing Prevention Mechanism to handle internal and
external threats. It is also suggested that it should covered data loss handling and data retention
mechanism to avoid data violation and loss in any way, and here we are using Holomorphic
encryption to provide the security.
ABSTRACT:
Cloud computing is emerging trend in today’s research world. The main benefits of cloud
computing are the adaptability, domain compatibility and better service use. So, the applicability
of cloud computing in different domain is the main strength with the ease of resource sharing. As
the increasing demand of cloud computing make a broader span in the direction of user-data
security. In this paper empirical meta-analysis has been provided in the direction of cloud
computing security. It also includes complete discussion based on the results achieved in the
same. This paper provides the analytical and empirical view of cloud computing security. The
major aspect covered in this paper is data security, data management and efficient resource
sharing mechanism. It also covers the computational aspect their applicability and the analytical
view for the study and analysis. It explores the wider view and the area of applicability in
different domain with the ease of data management and secure data sharing mechanism.
Domain: Cloud Computing
Technology: Java
EXISTING METHOD
The problems identified based on the recent survey and analyses are as follows: There is the need
of data sensitivity calculation to apply security in terms of data sensitivity and the size of the
data. There is the need of specific hierarchical or level-based orientation. There is the need of
data prevention mechanism in terms of security leak or identification of such leak in the timely
manner. There is the need of holomorphic encryption as the chances and the substitution are
completely different so that the security may enhance. There is the need of deterrent controls so
that the warning system can be maintained.
PROPOSED METHOD
They have suggested the maximum approaches uses for the data integrity are RSA based which
has higher computational overhead. So, they have proposed a data integrity approach. This
approach is based on the short signature algorithm. It has been used for the verification purpose.
It supports security. It reduces the computational overhead. It has been found to be efficient and
safe. It shows the current requirement of the todays cloud computing environment. It shows the
need of data handling mechanism and resource sharing with the protective view from internal
and external threats. It also shows that it may be helpful in the data retention and maintain the
required integrity for the security.
ADVANTAGES
APPLICATIONS
1. Software Industries.
2. Startup Companies.
3. Banking Sectors.
Domain: Cloud Computing
Technology: Java
SYSTEM REQUIREMENTS
H/W System Configuration:-