Keywords : cloud computing
A Scrutiny on Cloud Computing Security Issues
International Research Journal on Advanced Science Hub,
2021, Volume 3, Issue Special Issue 7S, Pages 138-143
DOI:
10.47392/irjash.2021.223
Cloud computing is one of the widely used technology in the 20th century. Cloud has become an essential part in our day-to-day life, because the data are stored in the cloud in any one form such as Gmail, Google Drive etc. As the users store sensitive information in the cloud, the Cloud Service Providers need to provide proper data security for data stored in the cloud. There are many issues in Cloud Computing Security. This paper discussed about various issues in the Cloud Computing environment and the future work directions have identified for the Cloud Computing Security.
Doctor Appointment System Using Cloud
International Research Journal on Advanced Science Hub,
2021, Volume 3, Issue Special Issue ICARD-2021 3S, Pages 13-17
DOI:
10.47392/irjash.2021.053
This paper is about optimising the appointment scheduling in hospitals using an web application.Online Doctor appointment is a web-App, this provides a signup and sign in for both doctors and patients. Doctors can sign up by giving his necessary details like timings, fee, and category. After successful signup, the doctor can sign in by giving username and password. The doctor can view the booking request by patients and if he accepts the patient requests the status will be shown as patient booking. The patients must be signup and sign in to book a doctor basing the category and the type of problem patient is facing and the location. The search results will show the list of doctors matching patients required criteria and he can select one and send a request to doctor and if he is available he will send the confirmation booking request and says confirmed to the patient. The patient can view the appointment and also he will get the sms saying the appointment scheduling is Confirmed.
Study and improved data storage in cloud computing using cryptography
International Research Journal on Advanced Science Hub,
2021, Volume 3, Issue Special Issue ICOST 2S, Pages 94-99
DOI:
10.47392/irjash.2021.046
Cloud computing is becoming a powerful network architecture to perform computing that is both large and complex. We present a cloud computing survey which outlines its core concepts, architectural principles, state-of- the art deployment and research challenges. Due to security issues, information over the Internet is becoming important. We have suggested a method to protect critical file data. Cryptography algorithms are an efficient way to encrypt sensitive data. It is a retrieval and transmission system that is readable only by intended users. The low cost and data usability of cloud computing is advantageous. Cloud storage has many advantages at low cost and data connectivity through the Internet. Ensured cloud data protection is an important part of the cloud computing environment because customers often store sensitive information with cloud storage services but they are not secure services. So, it remains a challenge to exchange data in a safe way while storing data from an unconfident cloud. Our solution guarantees consumer confidential data protection and privacy by using the AES, RC2 algorithm to store data in a single cloud. The cloud computing concept and transitional discussion under cloud computing will be provided previously proposed. The cryptographic algorithm used in cloud is then addressed and the latest trend for cloud security
Review and Analysis of Cloud and Fog Computing Platforms
International Research Journal on Advanced Science Hub,
2020, Volume 2, Issue 7, Pages 75-81
DOI:
10.47392/irjash.2020.68
As the call for data is rapidly increasing all over the globe it is necessary to deal with data safely to deal with data, we need some services like cloud and fog computing. Cloud computing and fog computing are the computing platforms which provide firm to run the communication without any kind of disturbance. This paper gives overview of cloud computing and fog computing. The survey of this paper focuses on cloud and fog computing and comparison of those both computing platforms. As we can easily analysis the best computing platform. As fog computing is the extended part of cloud computing that is it is add-on for the cloud computing platform. Cloud functions over internet it has many chances of collapsing while fog is more secure when compared to cloud as it has different protocols and standards in it and this fog have less chances of collapsing. Here fog computing security is higher when compared to cloud computing. This paper gives the review and analysis on fog and could computing.
Efficient and Enhanced Data Encryption in Cloud Computing
International Research Journal on Advanced Science Hub,
2020, Volume 2, Issue 3, Pages 1-4
DOI:
10.47392/irjash.2020.16
Cloud computing transforms the way information technology (IT) is consumed and managed, promising
improved cost efficiencies, accelerated innovation, faster time-to-market, and the ability to scale
applications on demand. However, as the shape of the cloud computing is emerging and developing
rapidly both conceptually and in reality, the legal/contractual, economic, service quality,
interoperability, security and privacy issues still pose significant challenges. In this project, we describe
various service and deployment models of cloud computing and identify major challenges. In particular,
we discuss three critical challenges: security and privacy issues in cloud computing. Some solutions
to mitigate these challenges are also proposed along with a brief presentation on the future trends
in cloud computing deployment. The use of cloud computing has increased rapidly in many organizations.
Cloud computing provides many benefits in terms of low cost and accessibility of data. Ensuring the
security of cloud computing is a major factor in the cloud computing environment, as users often store
sensitive information with cloud storage providers but these providers may not be trusted.