Publication Type : Journal Article
Publisher : International Journal of Engineering Trends and Technology
Source : International Journal of Engineering Trends and Technology, Volume 11 Numbers 9-May 2014 ISSN: 2231-5381
Url : https://ijettjournal.org/assets/volume-11/number-9/IJETT-V11P289.pdf
Campus : Chennai
School : School of Computing
Department : Computer Science and Engineering
Year : 2014
Abstract : Analyze in cloud computing be in the receipt of distributed process in transacting database utilize over cloud servers entities work in the evidence of authorization that are given an explanation for collection certified proof of authority. The proof and status it’s corrected and collects over the expended a point of time duration below the threat of process an authority policy of the client confident actuality not available circumstances. In this paper we focus on the felt finding of the problem we are defining the normal understanding trusted transaction when we are dealing with the proof of authorization in cloud computing and users can obtain there computation and storage to servers and it is also called cloud. Cloud can make available for use different like application ex (Google apps, what’s app) a large amount of data stored in clouds it’s highly quick to detect security and privacy. It is more important problems in cloud computing. The users must authenticate itself before initialization of any transaction it must be make sure that the cloud are other clients the cloud computing it keep the clients accounts is the facts it outsources the cloud computing itself responsible to the service part from the specialist solution make sure the secure and lack of disturbance and it is also require for code implementation.
Cite this Research Publication : Published a Research Paper Entitled "Authorization Based Secure Data Transaction in Cloud Computing" in the International Journal of Engineering Trends and Technology, Volume 11 Numbers 9-May 2014 ISSN: 2231-5381