Full Paper View Go Back

Cloud Computing: Data Storage Protocols and Security Techniques

R. V. Dharmadhikari1 , S. S. Turambekar2 , S. C. Dolli3 , P K Akulwar4

  1. Computer Science and Engineering, Sanjay Ghodawat Institutes, Shivaji University, Atigre, India.
  2. Computer Science and Engineering, Sanjay Ghodawat Institutes, Shivaji University, Atigre, India.
  3. Computer Science and Engineering, Sanjay Ghodawat Institutes, Shivaji University, Atigre, India.
  4. Computer Science and Engineering, Sanjay Ghodawat Institutes, Shivaji University, Atigre, India.

Section:Review Paper, Product Type: Isroset-Journal
Vol.6 , Issue.2 , pp.113-118, Apr-2018


CrossRef-DOI:   https://doi.org/10.26438/ijsrcse/v6i2.113118


Online published on Apr 30, 2018


Copyright © R. V. Dharmadhikari, S. S. Turambekar, S. C. Dolli, P K Akulwar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: R. V. Dharmadhikari, S. S. Turambekar, S. C. Dolli, P K Akulwar, “Cloud Computing: Data Storage Protocols and Security Techniques,” International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.2, pp.113-118, 2018.

MLA Style Citation: R. V. Dharmadhikari, S. S. Turambekar, S. C. Dolli, P K Akulwar "Cloud Computing: Data Storage Protocols and Security Techniques." International Journal of Scientific Research in Computer Science and Engineering 6.2 (2018): 113-118.

APA Style Citation: R. V. Dharmadhikari, S. S. Turambekar, S. C. Dolli, P K Akulwar, (2018). Cloud Computing: Data Storage Protocols and Security Techniques. International Journal of Scientific Research in Computer Science and Engineering, 6(2), 113-118.

BibTex Style Citation:
@article{Dharmadhikari_2018,
author = {R. V. Dharmadhikari, S. S. Turambekar, S. C. Dolli, P K Akulwar},
title = {Cloud Computing: Data Storage Protocols and Security Techniques},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {4 2018},
volume = {6},
Issue = {2},
month = {4},
year = {2018},
issn = {2347-2693},
pages = {113-118},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=618},
doi = {https://doi.org/10.26438/ijcse/v6i2.113118}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i2.113118}
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=618
TI - Cloud Computing: Data Storage Protocols and Security Techniques
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - R. V. Dharmadhikari, S. S. Turambekar, S. C. Dolli, P K Akulwar
PY - 2018
DA - 2018/04/30
PB - IJCSE, Indore, INDIA
SP - 113-118
IS - 2
VL - 6
SN - 2347-2693
ER -

511 Views    211 Downloads    140 Downloads
  
  

Abstract :
Cloud computing has emerged as a new technology for hosting and delivering services over the internet. Cloud computing removes the necessity for users to plan ahead for resource provisioning. So it is appealing for business owners. Using cloud computing enterprises can start off with little resources as needed and later on increase the resources when needed. Cloud computing has made a huge impact in IT industry. However cloud computing is at its developing stages only. Still there are many issues to be considered. In this paper an overview of cloud computing is given. The concepts used in cloud computing is also highlighted. This paper also gives an idea about the data storage security and protocols which are used in cloud computing.

Key-Words / Index Term :
Cloud computing; Virtualization; Data Storage; Security; Architecture

References :
[1] SurucheeV.Nandagaonkar, A.B Raut, “A Comprehensive Study on Cloud Computing” International Journal of Computer Science and Mobile Computing, vol, 3 Issue. 4, pg. 733-738, April 2014.
[2] http://cloudcomputingnet.com/cloud-computing-architecture/
[3] VikasGoyal, “Review: Layers architecture of cloud computing” International Journal of computing and Business research, Proceedings of „I-Society 2012‟at GKU
[4] https://www.computenext.com/blog/when-to-use-saas-paas-and-iaas/
[5] Qi Zhang, Lu Cheng, RaoufBoutaba, “Cloud computing: state-of-art and research challenges”, Journal of Internet Services and Applications, pg. 7-18, April 2010.
[6] https://www.techopedia.com/definition/26814/virtual-private-cloud-vpc.
[7] http://searchcloudapplications.techtarget.com/definition/virtual-private-cloud-VPC.
[8] http://whatis.techtarget.com/definition/multi-tenancy
[9] Keiko Hashiume, David G Rosado, Eduardo Fernandez-medina, Eduardo B Fernandez, “An Analysis of Security Issues of cloud Computing”, Journal of Internet Services and Applications, vol 4 Issue 5, 2013.
[10] http://searchcloudprovider.techtarget.com/definition/cloud-provisioning
[11] (http://erpbloggers.com/2013/07/the-five-essential-characteristics-of-cloud-computing/)
[12] Mladen A. Vouk, “Cloud Computing – Issues, Research and Implementation”, Journal of Computing and Information Technology, pg 235-246, April 2008.
[13] (http://searchsoa.techtarget.com/definition/service-oriented-architecture)
[14] (http://www.service-architecture.com/articles/web-services/service oriented_architecture_soa_definition.html)
[15] (http://searchservervirtualization.techtarget.com/definition/virtualization)
[16] T. Swathi, K. Srikanth, S. Raghunath Reddy,” Virtualization in Cloud Computing”, International Journal of Computer Science and Mobile Computing, vol, 3 Issue. 5, pg. 540-546, May 2014.
[17] B. Ramamurthy, K. Madurai,” Concepts, Technologies and Business Implications” Wipro Chennai, 2010.
[18] (http://searchcloudstorage.techtarget.com/feature/Cloud-storage-architecture-vs-local-storage)
[19] V. Spoorthy.M. Mamatha, B. Santhosh Kumar,” A Survey on Data Storage and Security in Cloud Computing”, International Journal of Computer Science and Mobile Computing, vol, 3 Issue. 6, pg. 306-313, June 2014.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation