.

ISSN 2063-5346
For urgent queries please contact : +918130348310

Prototype Analysis of Different Block Chain & Advanced Security Methodologies in Cloud Computing

Main Article Content

Aravind Chagantipati, Dr. V. Deeban Chakravarthy, Dr. Kadiyala Ramana
» doi: 10.48047/ecb/2023.12.Si8.789

Abstract

Cloud computing is an aggressive concept to share user’s data into cloud server and then process data based on different services with respect to on-demand procedures. Because of outsourcing nature of cloud computing user can only share/access data from storage system based on certain representation of attributes. There may be a trusted remote server is required to provide privacy to outsourced user’s data. Security is one key term in sharing data into cloud. Because of the security it provides in this age of information and computerization, block chain is being heralded as a potentially game-changing development in the world of money. In particular, it provides safety via verified virtual currency-sharing friendships, encryption, and a hash-age-based verification system. The global financial sector predicts that by 2020, the market for block chain technology based on security would have expanded to cover USD 20 billion. Additionally, block chain's usefulness isn't limited to the IoT environment; rather, it's expected to have other uses in the future. As a result of its efficiency and scalability, distributed computing has been widely used across all IT settings. Several methods were developed to make cloud-stored data available to users while also protecting their privacy. In this study, we conduct a comprehensive literature review of the many studies and scholarly viewpoints on the topic of data sharing via cloud computing. Additionally, the performance of many traditional approaches used in the field of secure data exchange in dispersed environments is analyzed. Examines the standard practices associated with the most important aggregate promotions in distributed data sharing in cloud environments, and talks about the many approaches that exist in this space for ensuring the safety of shared data amongst numerous users

Article Details