Lecture notes on cloud computing IV b. Tech-1 st semester prepared by



Download 1.49 Mb.
View original pdf
Page67/112
Date07.03.2022
Size1.49 Mb.
#58379
1   ...   63   64   65   66   67   68   69   70   ...   112
CC LECTURE NOTES
english grammar pdf 60
Microsoft Windows Azure. The Windows Azure Platform Azure) is an Internet-scale cloud services platform hosted in Microsoft data centers, which provides an operating system and a set of developer services that can be used individually or together [8]. The platform also provides scalable storage service. There are three basic data items blobs (up to 50 GB, tables, and queues ( k. In the Azure Storage, based on the blob, table, and queue structures, Microsoft promises to achieve confidentiality of the users data.






FIGURE 3.10. Security data access procedure.
PUT
GET
Data with MD5
C
re ate a Account Get the Secret K
ey
C
re ate Signature Create Co n
te n
tM
D
5
C
lo u
d
Storage div


62
TECHNOLOGIES FOR DATA SECURITY IN CLOUD
COMPUTING
This section presents several technologies for data security and privacy in cloud computing. Focusing on the unique issues of the cloud data storage platform, this section does not repeat the normal approaches that provide confidentiality, integrity, and availability in distributed data storage applications. Instead, we select to illustrate the unique requirements for cloud computing data security from a few different perspectives

Database
Outsourcing
and
Query
Integrity
Assurance. Researchers have pointed out that storing data into and fetching data from devices and machines behind a cloud are essentially a novel form of database outsourcing.

Data Integrity in Untrustworthy Storage. One of the main challenges that prevent end users from adopting cloud storage services is the fear of losing data or data corruption. It is critical to relieve the users fear by providing technologies that enable users to check the integrity of their data.

Web-Application-Based Security. Once the dataset is stored remotely, a Web browser is one of the most convenient approaches that end users can use to access their data on remote services. In the era of cloud computing, Web security plays a more important role than ever.

Multimedia Data Security. With the development of high-speed network technologies and large bandwidth connections, more and more multimedia data are being stored and shared in cyberspace. The security requirements for video, audio, pictures, or images are different from other applications.





63

Download 1.49 Mb.

Share with your friends:
1   ...   63   64   65   66   67   68   69   70   ...   112




The database is protected by copyright ©ininet.org 2024
send message

    Main page