UGC Approved Journal no 63975(19)
New UGC Peer-Reviewed Rules

ISSN: 2349-5162 | ESTD Year : 2014
Volume 13 | Issue 3 | March 2026

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 6 Issue 3
March-2019
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR1903199


Registration ID:
198656

Page Number

635-644

Share This Article


Jetir RMS

Title

Verifying automatic content using cloud computing environment

Abstract

Cloud Computing is a paradigm for delivering information technology services in which resources are extracted from the internet with the help of web-based tools and applications, rather than a straight link to a server. Here data and calculations are done somewhere in a “cloud” that has a collection of data centers owned and maintained by a third party. Cloud computing allows highly scalable services to be used over the Internet. Cloud services are provided on user request basis. User data control is lowered on data sharing under remote machines. Entities are permitted to join and leave the cloud in an easy manner. Centralized monitoring applications are not fit for the highly dynamic data access environment. Data access management can be done with the help of cloud service providers (CSP). The 3 verification modules of cloud data centers are verified automatically and are categorized as data centers, client and data owners. Data centers are used for client and data owner information. The number of tasks involved with authenticated code and time are done using the client. Data owner is used for finding the digital signatures. These are done with the help of algorithms such as log retrieval algorithm, reversed shamir algorithm and secure hashing algorithm. Cloud Information Accountability (CIA) model is a decentralized information accountability model. It provides end – to – end accountability in a distributed fashion. It has the aspects of access control, usage control and authentication. The CIA is enriched in providing the authentication schemes for the JAR files. It combines the data and run time integrity verification process. The log data analysis has the indexing and the aggregate functions. It comprises of data and executable access control paradigm.

Key Words

Cloud computing, public cloud, private cloud, hybrid cloud, IaaS, PaaS, SaaS

Cite This Article

"Verifying automatic content using cloud computing environment", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.6, Issue 3, page no.635-644, March-2019, Available :http://www.jetir.org/papers/JETIR1903199.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Verifying automatic content using cloud computing environment", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.6, Issue 3, page no. pp635-644, March-2019, Available at : http://www.jetir.org/papers/JETIR1903199.pdf

Publication Details

Published Paper ID: JETIR1903199
Registration ID: 198656
Published In: Volume 6 | Issue 3 | Year March-2019
DOI (Digital Object Identifier):
Page No: 635-644
Country: Coimbatore, Tamil Nadu, India .
Area: Arts
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0003047

Print This Page

Current Call For Paper

Jetir RMS