Optimized Storage and Secured Data Transaction in Cloud Environment using ECC and Huffman Encoding
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Downloads: 104 | Weekly Hits: ⮙2

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 6, June 2016

Optimized Storage and Secured Data Transaction in Cloud Environment using ECC and Huffman Encoding

Saket Nigam, Rekhansh Rao

Cloud Computing services addresses the problems of privacy and security. For providing such services, it takes the help of internet. It helps users in accessing files and using applications. These services can be used according to user?s demand and usage requirements. It helps in storing data from more than one client. It grants remote access of data to users. It saves cost and there is no need for buying storage devices. It also helps in preventing loss of information system failure. Cloud computing is a computing structure in which computer infrastructure resources are provided as service to users. This is done through the help of internet. This technology helps in accessing their files and application remotely. It can be done through any other computer. Cloud based services include software, platform & infrastructure as services. These services allows users to take benefits of such services where as demand arises. These services are usage based and are purchased on the basis of need & timely requirements. These area unit several benefits of cloud storage of information, however the most problems area unit associated with security & access management as a results information |of information} storage on severs don't seem to be at intervals constant positive domain as knowledge householders. For the purpose of security & maintenance of confidentiality, cryptography is used .all this is done from the help of internet. Cloud storage provides a platform for applications and infrastructure related services. Most of the information, which is store in cloud is sensitive.

Keywords: Access control, Authentication, Attribute-based signature, Attribute-based encription, cloud storage, cast minimizing

Edition: Volume 5 Issue 6, June 2016

Pages: 1371 - 1376

Share this Article

How to Cite this Article?

Saket Nigam, Rekhansh Rao, "Optimized Storage and Secured Data Transaction in Cloud Environment using ECC and Huffman Encoding", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV164529, Volume 5 Issue 6, June 2016, 1371 - 1376

Enter Your Registered Email Address





Similar Articles with Keyword 'Access control'

Downloads: 67 | Monthly Hits: ⮙6

Research Paper, Computer Science & Engineering, Congo, Volume 10 Issue 3, March 2021

Pages: 61 - 70

Contribution of an Embedded and Biometric System in a Replicated Database for Access Control in a Multi-Entry Institution

Bopatriciat Boluma Mangata, Eugene Mbuyi Mukendi, Jean-Didier Batubenga

Share this Article

Downloads: 101 | Weekly Hits: ⮙2 | Monthly Hits: ⮙10

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1752 - 1755

SNPDAC: Secure Network Protocol with Data Access Controlling in WSN

Uttarkar Amit Ratikant, Hingoliwala H. A.

Share this Article

Downloads: 103 | Weekly Hits: ⮙2 | Monthly Hits: ⮙10

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1373 - 1376

Filtering of Malicious Traffic Based on Optimal Source

Pikkili Mahendra, K. Raghavendra Rao

Share this Article

Downloads: 103 | Weekly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1736 - 1740

Enhanced Retreat of Cloud Storage Data users by Using Improved Data Access Control Scheme for Multi-Authority Cloud Storage

Shafi Shaik, M. Geethalatha

Share this Article

Downloads: 103 | Weekly Hits: ⮙2 | Monthly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1454 - 1457

A Reliable Method for Accuracy Constrained Privacy Preservation for Relational Data

Waghmare Ashwini R, V. M. Jarali

Share this Article

Similar Articles with Keyword 'Authentication'

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 46 | Weekly Hits: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Downloads: 99

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 4, April 2017

Pages: 1760 - 1762

A Survey on Existing Password Storage Methods and their Security

Samruddhi Patil, Kumud Wasnik

Share this Article

Downloads: 100 | Weekly Hits: ⮙1 | Monthly Hits: ⮙9

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2483 - 2487

Accountability of Data usage in Cloud Computing

Nitin P. Doiphode, Hemlata Channe

Share this Article

Downloads: 100 | Weekly Hits: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1548 - 1550

Survey on Distributed Mobile Cloud Computing Services: Signature Scheme for a Privacy-Aware Authentication

Chaitali P. Kathar, Vidya Dhamdhere

Share this Article

Similar Articles with Keyword 'cloud storage'

Downloads: 98 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1939 - 1946

An Approach for Video Compression Technique for Efficient Data Backup and Recovery in Public Cloud

Nagaraj S Kolhar, Dr. Suvarna Nandyal

Share this Article

Downloads: 99 | Weekly Hits: ⮙2 | Monthly Hits: ⮙10

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

Downloads: 100 | Weekly Hits: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1058 - 1060

Data Integrity Proof in Cloud Computing using TPA with Privacy Preserving

Rushikesh P. Dhanokar

Share this Article

Downloads: 100 | Weekly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1709 - 1712

A Business Framework for Securing Data Storage over Cloud Environment using ECC Crypto System

Nara Venkata Surendra Reddy, DLS Reddy

Share this Article

Downloads: 101 | Weekly Hits: ⮙1 | Monthly Hits: ⮙10

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1232 - 1234

A Review on Data Sharing Across Cloud Storage Using Key Aggregate Cryptosystem

Rashmi Khawale, Omprakash Tembhurne

Share this Article



Top