Full Paper View Go Back
Cloud Computing: Data Storage Protocols and Security Techniques
R. V. Dharmadhikari1 , S. S. Turambekar2 , S. C. Dolli3 , P K Akulwar4
- Computer Science and Engineering, Sanjay Ghodawat Institutes, Shivaji University, Atigre, India.
- Computer Science and Engineering, Sanjay Ghodawat Institutes, Shivaji University, Atigre, India.
- Computer Science and Engineering, Sanjay Ghodawat Institutes, Shivaji University, Atigre, India.
- Computer Science and Engineering, Sanjay Ghodawat Institutes, Shivaji University, Atigre, India.
Section:Review Paper, Product Type: Isroset-Journal
Vol.6 ,
Issue.2 , pp.113-118, Apr-2018
CrossRef-DOI: https://doi.org/10.26438/ijsrcse/v6i2.113118
Online published on Apr 30, 2018
Copyright © R. V. Dharmadhikari, S. S. Turambekar, S. C. Dolli, P K Akulwar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: R. V. Dharmadhikari, S. S. Turambekar, S. C. Dolli, P K Akulwar, “Cloud Computing: Data Storage Protocols and Security Techniques,” International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.2, pp.113-118, 2018.
MLA Style Citation: R. V. Dharmadhikari, S. S. Turambekar, S. C. Dolli, P K Akulwar "Cloud Computing: Data Storage Protocols and Security Techniques." International Journal of Scientific Research in Computer Science and Engineering 6.2 (2018): 113-118.
APA Style Citation: R. V. Dharmadhikari, S. S. Turambekar, S. C. Dolli, P K Akulwar, (2018). Cloud Computing: Data Storage Protocols and Security Techniques. International Journal of Scientific Research in Computer Science and Engineering, 6(2), 113-118.
BibTex Style Citation:
@article{Dharmadhikari_2018,
author = {R. V. Dharmadhikari, S. S. Turambekar, S. C. Dolli, P K Akulwar},
title = {Cloud Computing: Data Storage Protocols and Security Techniques},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {4 2018},
volume = {6},
Issue = {2},
month = {4},
year = {2018},
issn = {2347-2693},
pages = {113-118},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=618},
doi = {https://doi.org/10.26438/ijcse/v6i2.113118}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i2.113118}
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=618
TI - Cloud Computing: Data Storage Protocols and Security Techniques
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - R. V. Dharmadhikari, S. S. Turambekar, S. C. Dolli, P K Akulwar
PY - 2018
DA - 2018/04/30
PB - IJCSE, Indore, INDIA
SP - 113-118
IS - 2
VL - 6
SN - 2347-2693
ER -
Abstract :
Cloud computing has emerged as a new technology for hosting and delivering services over the internet. Cloud computing removes the necessity for users to plan ahead for resource provisioning. So it is appealing for business owners. Using cloud computing enterprises can start off with little resources as needed and later on increase the resources when needed. Cloud computing has made a huge impact in IT industry. However cloud computing is at its developing stages only. Still there are many issues to be considered. In this paper an overview of cloud computing is given. The concepts used in cloud computing is also highlighted. This paper also gives an idea about the data storage security and protocols which are used in cloud computing.
Key-Words / Index Term :
Cloud computing; Virtualization; Data Storage; Security; Architecture
References :
[1] SurucheeV.Nandagaonkar, A.B Raut, “A Comprehensive Study on Cloud Computing” International Journal of Computer Science and Mobile Computing, vol, 3 Issue. 4, pg. 733-738, April 2014.
[2] http://cloudcomputingnet.com/cloud-computing-architecture/
[3] VikasGoyal, “Review: Layers architecture of cloud computing” International Journal of computing and Business research, Proceedings of „I-Society 2012‟at GKU
[4] https://www.computenext.com/blog/when-to-use-saas-paas-and-iaas/
[5] Qi Zhang, Lu Cheng, RaoufBoutaba, “Cloud computing: state-of-art and research challenges”, Journal of Internet Services and Applications, pg. 7-18, April 2010.
[6] https://www.techopedia.com/definition/26814/virtual-private-cloud-vpc.
[7] http://searchcloudapplications.techtarget.com/definition/virtual-private-cloud-VPC.
[8] http://whatis.techtarget.com/definition/multi-tenancy
[9] Keiko Hashiume, David G Rosado, Eduardo Fernandez-medina, Eduardo B Fernandez, “An Analysis of Security Issues of cloud Computing”, Journal of Internet Services and Applications, vol 4 Issue 5, 2013.
[10] http://searchcloudprovider.techtarget.com/definition/cloud-provisioning
[11] (http://erpbloggers.com/2013/07/the-five-essential-characteristics-of-cloud-computing/)
[12] Mladen A. Vouk, “Cloud Computing – Issues, Research and Implementation”, Journal of Computing and Information Technology, pg 235-246, April 2008.
[13] (http://searchsoa.techtarget.com/definition/service-oriented-architecture)
[14] (http://www.service-architecture.com/articles/web-services/service oriented_architecture_soa_definition.html)
[15] (http://searchservervirtualization.techtarget.com/definition/virtualization)
[16] T. Swathi, K. Srikanth, S. Raghunath Reddy,” Virtualization in Cloud Computing”, International Journal of Computer Science and Mobile Computing, vol, 3 Issue. 5, pg. 540-546, May 2014.
[17] B. Ramamurthy, K. Madurai,” Concepts, Technologies and Business Implications” Wipro Chennai, 2010.
[18] (http://searchcloudstorage.techtarget.com/feature/Cloud-storage-architecture-vs-local-storage)
[19] V. Spoorthy.M. Mamatha, B. Santhosh Kumar,” A Survey on Data Storage and Security in Cloud Computing”, International Journal of Computer Science and Mobile Computing, vol, 3 Issue. 6, pg. 306-313, June 2014.
You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at support@isroset.org or view contact page for more details.