Neural Networks and Rules-based Systems used to Find Rational and Scientific Correlations between being Here and Now with Afterlife Conditions
Neural Networks and Rules-based Systems used to Find Rational and
Article Fingerprint
ReserarchID
CSTB538FH
Kethan Harish Yekula
Cloud computing is the process of providing the virtualized services over the internet. The space in the web commonly known as Cloud has been monitored by service provider. In a real time scenario, a user registers for a particular service and shares his data as well as access credential policies with CSP (cloud service provider). Though cloud computing has got major flexibility in data accessing, users are very much concerned about their data security as it may be mislead by service providers. They may share the owner’s data to unauthenticated persons. This is a big threat to the data owners. In this paper a modern approach, is proposed namely Cloud Information Accountability (CIA) framework, and based on the notion of data liability. We identify the common requirements and develop several guidelines to achieve data accountability in the cloud. Once the data owner provides data, the service provider will have full access and permission rights, on the data. Using traditional access control mechanisms, after data rights are permitted, the data is in the hands of the service provider. We propose an algorithm, which gives the details of people accessing the data using the automated logging details through the JAR files.
Kethan Harish Yekula. 2013. \u201cSafeguarding the liabilities of Data Accessing in Cloud Computing\u201d. Global Journal of Computer Science and Technology - B: Cloud & Distributed GJCST-B Volume 13 (GJCST Volume 13 Issue B4): .
Crossref Journal DOI 10.17406/gjcst
Print ISSN 0975-4350
e-ISSN 0975-4172
The methods for personal identification and authentication are no exception.
The methods for personal identification and authentication are no exception.
Total Score: 108
Country: India
Subject: Global Journal of Computer Science and Technology - B: Cloud & Distributed
Authors: Kethan Harish Yekula, Dr. Y.Venkateswarlu, Suneel Kumar Badugu (PhD/Dr. count: 1)
View Count (all-time): 252
Total Views (Real + Logic): 9375
Total Downloads (simulated): 2306
Publish Date: 2013 11, Mon
Monthly Totals (Real + Logic):
Neural Networks and Rules-based Systems used to Find Rational and
A Comparative Study of the Effeect of Promotion on Employee
The Problem Managing Bicycling Mobility in Latin American Cities: Ciclovias
Impact of Capillarity-Induced Rising Damp on the Energy Performance of
Cloud computing is the process of providing the virtualized services over the internet. The space in the web commonly known as Cloud has been monitored by service provider. In a real time scenario, a user registers for a particular service and shares his data as well as access credential policies with CSP (cloud service provider). Though cloud computing has got major flexibility in data accessing, users are very much concerned about their data security as it may be mislead by service providers. They may share the owner’s data to unauthenticated persons. This is a big threat to the data owners. In this paper a modern approach, is proposed namely Cloud Information Accountability (CIA) framework, and based on the notion of data liability. We identify the common requirements and develop several guidelines to achieve data accountability in the cloud. Once the data owner provides data, the service provider will have full access and permission rights, on the data. Using traditional access control mechanisms, after data rights are permitted, the data is in the hands of the service provider. We propose an algorithm, which gives the details of people accessing the data using the automated logging details through the JAR files.
We are currently updating this article page for a better experience.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.