Security Enhancement Using P-Encryption Approach for Safer Clouds
Keywords:
Filtering, P-Encryption, Authentication, SecurityAbstract
Millions of people use public cloud storage to share and exchange files, but at times due to their openness it restricts the usage. Here we apply data encryption which enables the users to access cloud in a risk free manner.
References
- Rajkumar Buyya, “Introduction to the IEEE Transactions on Cloud Computing”, IEEE Transactions on Cloud Computing, Vol. 1, No. 1, January-June 2013.
- Kevin Hamlen, Murat Kantarcioglu, Latifur Khan, Bhavani Thuraisingham “ Security Issues for Cloud Computing” ,Technical Report, UTDCS-02-01Feb 2010.
- Hao, Chen, and Ying Qiao. "Research of Cloud Computing Based on the Hadoop Platform," Chengdu, China: 2011, Pp. 181 – 184, 21-23 Oct 2011.
- Ren, Yulong, and Wen Tang. "A Service Integrity Assurance Framework for Cloud Computing Based on Mapreduce."Proceedings of IEEE CCIS2012. Hangzhou: 2012, Pp 240 – 244, Oct. 30 2012-Nov. 1 2012
- Chitharanjan, and Kala Karun A. "A Review on Hadoop — HDFS Infrastructure Extensions", Jeju Island: 2013, Pp. 132-137, 11-12 Apr. 2013.
Downloads
Published
2016-10-31
Issue
Section
Research Articles
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.
How to Cite
[1]
A. Reyana, M. Amutha "Security Enhancement Using P-Encryption Approach for Safer Clouds" International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099,
Volume 2, Issue 5, pp.445-448, September-October-2016.