Open Access   Article Go Back

Statistical Analysis of Data Access Techniques in Cloud

Nikita Ashtankar1 , Mona Mulchandani2

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-12 , Page no. 75-77, May-2019

Online published on May 12, 2019

Copyright © Nikita Ashtankar, Mona Mulchandani . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Nikita Ashtankar, Mona Mulchandani, “Statistical Analysis of Data Access Techniques in Cloud,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.12, pp.75-77, 2019.

MLA Style Citation: Nikita Ashtankar, Mona Mulchandani "Statistical Analysis of Data Access Techniques in Cloud." International Journal of Computer Sciences and Engineering 07.12 (2019): 75-77.

APA Style Citation: Nikita Ashtankar, Mona Mulchandani, (2019). Statistical Analysis of Data Access Techniques in Cloud. International Journal of Computer Sciences and Engineering, 07(12), 75-77.

BibTex Style Citation:
@article{Ashtankar_2019,
author = {Nikita Ashtankar, Mona Mulchandani},
title = {Statistical Analysis of Data Access Techniques in Cloud},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {07},
Issue = {12},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {75-77},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1047},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1047
TI - Statistical Analysis of Data Access Techniques in Cloud
T2 - International Journal of Computer Sciences and Engineering
AU - Nikita Ashtankar, Mona Mulchandani
PY - 2019
DA - 2019/05/12
PB - IJCSE, Indore, INDIA
SP - 75-77
IS - 12
VL - 07
SN - 2347-2693
ER -

           

Abstract

As per recent trend, cloud computing is the most high in demand, reliable and efficient technology. There are amazing benefits that are available with cloud computing like minimum investment cost, tremendous storage space, virtualization, resource sharing. The Cloud users are beneficial with this technology as they can use the large volume of data in cloud and access it anytime, anywhere easily from any corner of the world. This is achievable in pay per use or pre-paid basis. As this is a pro it also has cons, i.e security and Market competition. Many users can request for data, so, technologist need to ensure they authenticate and authorize the users to access this data. This is achievable thru access control schemes which not only allows a authenticated and authorized user to access the data but also can deny access to malicious user. In this paper we are discussing the same pain area i.e existing access control schemes along with Analysis and techniques to improve the speed of data access.

Key-Words / Index Term

Cloud Computing, data access, compression techniques

References

[1] http://commons.apache.org/proper/commonsmath/download_math.cgi , accessed 11 March 2016
[2] IET Commun., 2017, Vol. 11 Iss. 10, pp. 1558 1565 © The Institution of Engineering and Technology 2017
[3] http://www.ijritcc.org/download/browse/Volume_5_Issues/November_17_Volume_5_Issue_11/1510653367_14-11-2017.pdf
[4] Majumder, A., Namasudra, S., Nath, S.:„Taxonomy and classification ofaccess control models for cloud environments‟. in Mahmood, Z.(Ed.):„Continued rise of the cloud‟ (Springer, 2014), pp. 23–53
[5] Schuster, F., Costa, M., Fournet, C., et al.:VC3: trustworthy data analytics inthe cloud usingSGX‟. Proc. of the IEEE Symp. on Security and Privacy, SanJose, CA, May 2015, pp. 38–54.
[6] Zhu, Y., Hu, H., Ahn, G.J., et al.: „Towards temporal access control in cloudcomputing‟. Proc. of the IEEE INFOCOM, Orlando, FL, March 2012, pp.2576–2580.
[7] Ma Mingli, “Study and Realization of Comprehensive Service Platform Based on Cloud Foundry,”Dalian: School of Computing, Dalian University of Technology, 2014
[8] Yang Zhaohua and Yang Haojie,“SOA Enterprise Framework Design Based on Cloud Computin],”Computer Disc Software and Application, 2012.
[9] W. Treesinthuros, "E-commerce transaction security model based on cloud computing," in 2012 IEEE 2nd International Conference onCloud Computing and Intelligence Systems, 2012, pp. 344-347.
[10] G. Hemlata, D. Hema, and R. Ramaswamy, "Developing a Cloud- Computing Adoption Framework," Global Business Review, vol. 16, pp.632–651, 2015.
[11] M. Naderpour, J. Lu, and G. Zhang, "An intelligent situation awareness support system for safety-critical environments," Decision SupportSystems, vol. 59, pp. 325-340, 2014.
[12] C. Diwaker and P. Dembla ,“Survey on CloudComputing”, International Journal of Advanced Research in Computer Science, vol. 5, no. 5, May-June 2014, pp. 53-55.
[13] Allen, I.E., Seaman, J. Changing Course: Ten Years of Tracking Online Education in the United States, Oakland, Babson Survey Research Group and Quashog Research Group, LLC. (2013)
[14] A systematic literature review of software requirements prioritization research. Information &Software Technology 56(6): 568-585 (2014)