Protection Aware User Identity and Data Storage (PAUIDS) Scheme for Management of User Identification in Cloud
- 30 September 2021
- journal article
- Published by Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP in International Journal of Soft Computing and Engineering
- Vol. 11 (1), 51-56
- https://doi.org/10.35940/ijsce.a3526.0911121
Abstract
Cloud computing the technology which have the capability of modifying the method computing strongly, and storage resources will be accessed shortly. User Identification is an entity to detect the user who using the system or website. In information technology the protection of information consistently become a major issue to handle. The data might place in various locations in the world since it become particularly serious. The two main factors regarding cloud technology are information protection and security. The cloud operators can easily reach the sensitive information that affects the data security and protection measures. Therefore, this research protocol mainly focuses on secure data storage that always been a significant feature of quality of service. To guarantee the ‘rightness of users’ information in cloud storage system a Protection Aware User Identity and Data Storage (PAUIDS) algorithm is proposed that separates the document and independently stores the user information in the cloud storage servers. The proposed algorithm reduces the encryption and decryption time in a cloud storage system and providing secure and efficient data storage in cloud environments.Keywords
This publication has 12 references indexed in Scilit:
- A Review on Security Issue in Security Model of Cloud Computing EnvironmentPublished by Springer Science and Business Media LLC ,2018
- A maximum powerpoint tracking using perturb and observation algorithm by LABVIEW and arduinoPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2014
- A Fast and Secure Scheme for Data Outsourcing in the CloudKSII Transactions on Internet and Information Systems, 2014
- Fault indulgent in embedded memory using WCET real-time embedded systemPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2014
- Security Threats with Associated Mitigation Techniques in Cloud ComputingInternational Journal of Applied Information Systems, 2013
- Building Confidential and Efficient Query Services in the Cloud with RASP Data PerturbationIEEE Transactions on Knowledge and Data Engineering, 2013
- Policy-Based Automation of SLA Establishment for Cloud Computing ServicesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2012
- An Autonomous Reliability-Aware Negotiation Strategy for Cloud Computing EnvironmentsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2012
- Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud DataIEEE Transactions on Parallel and Distributed Systems, 2011
- Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utilityFuture Generation Computer Systems, 2009