Aritra Dutta, R. Bose, S. K. Chakraborty, Sandip Roy, Haraprasad Mondal
{"title":"绿色云的数据安全机制","authors":"Aritra Dutta, R. Bose, S. K. Chakraborty, Sandip Roy, Haraprasad Mondal","doi":"10.1109/IEMRE52042.2021.9386525","DOIUrl":null,"url":null,"abstract":"Data and veracious information are an important feature of any organization; it takes special care as a like asset of the organization. Cloud computing system main target to provide service to the user like high-speed access user data for storage and retrieval. Now, big concern is data protection in cloud computing technology as because data leaking and various malicious attacks happened in cloud computing technology. This study provides user data protection in the cloud storage device. The article presents the architecture of a data security hybrid infrastructure that protects and stores the user data from the unauthenticated user. In this hybrid model, we use a different type of security model.","PeriodicalId":202287,"journal":{"name":"2021 Innovations in Energy Management and Renewable Resources(52042)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Data Security Mechanism for Green Cloud\",\"authors\":\"Aritra Dutta, R. Bose, S. K. Chakraborty, Sandip Roy, Haraprasad Mondal\",\"doi\":\"10.1109/IEMRE52042.2021.9386525\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Data and veracious information are an important feature of any organization; it takes special care as a like asset of the organization. Cloud computing system main target to provide service to the user like high-speed access user data for storage and retrieval. Now, big concern is data protection in cloud computing technology as because data leaking and various malicious attacks happened in cloud computing technology. This study provides user data protection in the cloud storage device. The article presents the architecture of a data security hybrid infrastructure that protects and stores the user data from the unauthenticated user. In this hybrid model, we use a different type of security model.\",\"PeriodicalId\":202287,\"journal\":{\"name\":\"2021 Innovations in Energy Management and Renewable Resources(52042)\",\"volume\":\"47 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-02-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 Innovations in Energy Management and Renewable Resources(52042)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IEMRE52042.2021.9386525\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 Innovations in Energy Management and Renewable Resources(52042)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IEMRE52042.2021.9386525","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Data and veracious information are an important feature of any organization; it takes special care as a like asset of the organization. Cloud computing system main target to provide service to the user like high-speed access user data for storage and retrieval. Now, big concern is data protection in cloud computing technology as because data leaking and various malicious attacks happened in cloud computing technology. This study provides user data protection in the cloud storage device. The article presents the architecture of a data security hybrid infrastructure that protects and stores the user data from the unauthenticated user. In this hybrid model, we use a different type of security model.