cloudbc—安全的云数据访问管理系统

S. Ramamoorthy, B. Baranidharan
{"title":"cloudbc—安全的云数据访问管理系统","authors":"S. Ramamoorthy, B. Baranidharan","doi":"10.1109/ICCCT2.2019.8824828","DOIUrl":null,"url":null,"abstract":"Data security and Storage Management becomes the most promising task for any IT operation in the future. The business and service provider’s mange to finds the technology like cloud computing for pooled computing resources. The enormous amounts of research works are initiated in parallel to protect data on the cloud environment. This leads to the strong evidence of unanswered questions related to the data security over the cloud data centres. The Cloud computing model used as a primary technology in many IT business operations across the millions of users. To ensure the data security and modification over the data stored on the cloud considered as a major issue among the community cloud users. The Proposed research work aims to protect the cloud data by implementing the new approach using blockchain technology. The Hybrid approach to combine the BlockChain(BC) Technology with cloud computing to ensure the data security among the community cloud users. is Hybrid approach will restrict the malicious data access and modification on the cloud servers. The secure hash blocks are generated and maintained by the cloud storage devices enhance the data security on the cloud. The block chains allow the user to trace back the malicious data access and modifications.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"CloudBC-A Secure Cloud Data acess Management system\",\"authors\":\"S. Ramamoorthy, B. Baranidharan\",\"doi\":\"10.1109/ICCCT2.2019.8824828\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Data security and Storage Management becomes the most promising task for any IT operation in the future. The business and service provider’s mange to finds the technology like cloud computing for pooled computing resources. The enormous amounts of research works are initiated in parallel to protect data on the cloud environment. This leads to the strong evidence of unanswered questions related to the data security over the cloud data centres. The Cloud computing model used as a primary technology in many IT business operations across the millions of users. To ensure the data security and modification over the data stored on the cloud considered as a major issue among the community cloud users. The Proposed research work aims to protect the cloud data by implementing the new approach using blockchain technology. The Hybrid approach to combine the BlockChain(BC) Technology with cloud computing to ensure the data security among the community cloud users. is Hybrid approach will restrict the malicious data access and modification on the cloud servers. The secure hash blocks are generated and maintained by the cloud storage devices enhance the data security on the cloud. The block chains allow the user to trace back the malicious data access and modifications.\",\"PeriodicalId\":445544,\"journal\":{\"name\":\"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)\",\"volume\":\"29 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCT2.2019.8824828\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCT2.2019.8824828","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

摘要

数据安全和存储管理成为未来任何IT运营最有前途的任务。业务和服务提供商设法为集中的计算资源找到云计算之类的技术。大量的研究工作同时启动,以保护云环境中的数据。这导致了与云数据中心的数据安全相关的未解决问题的有力证据。在涉及数百万用户的许多IT业务操作中,云计算模型被用作主要技术。确保数据的安全性和对存储在云上的数据的修改被认为是社区云用户的主要问题。拟议的研究工作旨在通过使用区块链技术实施新方法来保护云数据。将区块链(BC)技术与云计算相结合的混合方式,确保社区云用户之间的数据安全。混合方法将限制云服务器上的恶意数据访问和修改。安全哈希块由云存储设备生成和维护,增强了云上数据的安全性。区块链允许用户追溯恶意数据访问和修改。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
CloudBC-A Secure Cloud Data acess Management system
Data security and Storage Management becomes the most promising task for any IT operation in the future. The business and service provider’s mange to finds the technology like cloud computing for pooled computing resources. The enormous amounts of research works are initiated in parallel to protect data on the cloud environment. This leads to the strong evidence of unanswered questions related to the data security over the cloud data centres. The Cloud computing model used as a primary technology in many IT business operations across the millions of users. To ensure the data security and modification over the data stored on the cloud considered as a major issue among the community cloud users. The Proposed research work aims to protect the cloud data by implementing the new approach using blockchain technology. The Hybrid approach to combine the BlockChain(BC) Technology with cloud computing to ensure the data security among the community cloud users. is Hybrid approach will restrict the malicious data access and modification on the cloud servers. The secure hash blocks are generated and maintained by the cloud storage devices enhance the data security on the cloud. The block chains allow the user to trace back the malicious data access and modifications.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Sustainability and Fog Computing: Applications, Advantages and Challenges Human Gait Recognition using Deep Convolutional Neural Network A Systematic analysis of Data-intensive MOOCs and their key Challenges Forensic Based Cloud Computing Architecture – Exploration and Implementation SPICE Modelling of CNTFET based Neuron Architecture for Low Power and High Speed applications
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1