International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Downloads: 130 | Views: 226

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 12, December 2015 | Rating: 6.3 / 10

A Survey on Safe Information Sharing and Query Processing Via Organization of Cloud Computing

Shraddha Jadhav [2]

Abstract: Here, we are going to examine security issues for distributed computing and present a layered structure for secure mists and after that attention on two of the layers, i. e. , the capacity layer and the information layer. Distributed computing is an arrangement of IT administrations that are given to a client over a system on a rented premise and with the capacity to scale up or down their administration necessities. Typically distributed computing administrations are conveyed by an outsider supplier who claims the base. It points of interest to specify yet a couple incorporate adaptability, strength, adaptability, proficiency and outsourcing non-center exercises. This paper will chat secure unified inquiry handling with guide Reduce and Hadoop, and examine the utilization of secure coprocessors for distributed computing. Distributed computing offers a creative plan of action for associations to receive IT administrations without forthright venture. Regardless of the potential additions accomplished from the distributed computing, the associations are moderate in tolerating it because of security issues and difficulties connected with it. Security is one of the real issues which hamper the development of cloud. The thought of giving over essential information to another organization is troubling, such that the buyers need to be careful in comprehension the dangers of information ruptures in this new environment. This paper presents a nitty gritty examination of the distributed computing security issues and difficulties concentrating on the distributed computing sorts and the administration conveyance sorts.

Keywords: Cloud computing, Security, Data Storage, Data Encryption, Data Decryption

Edition: Volume 4 Issue 12, December 2015,

Pages: 43 - 47

How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link

Verification Code will appear in 2 Seconds ... Wait