000 -LEADER |
fixed length control field |
a |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20191014152712.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
191014b xxu||||| |||| 00| 0 eng d |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
AIKTC-KRRC |
Transcribing agency |
AIKTC-KRRC |
100 ## - MAIN ENTRY--PERSONAL NAME |
9 (RLIN) |
9868 |
Author |
Muthuraj Kumar S. |
245 ## - TITLE STATEMENT |
Title |
Privacy Preservation Guidelines Based Substance Distribution in Public Clouds |
250 ## - EDITION STATEMENT |
Volume, Issue number |
Vol.6(1), Jan-June |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Tamil Nadu |
Name of publisher, distributor, etc. |
i-manager's |
Year |
2019 |
300 ## - PHYSICAL DESCRIPTION |
Pagination |
27-35p. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
Cloud data storage has the biggest challenge on the maintenance of data integrity at untrusted servers. Cloud computing delivers cloud services such as databases, networking, etc. The service charge for cloud services is based on the usage of the services. Cloud databases provide facilities for large scale data storage and retrieval of distributed data. In order to provide effective data integrity and security, it is necessary to propose new storage and retrieval algorithms for cloud databases. The cloud storage provides a secure way to remotely store the important information. In Cloud data is stored on remote servers and retrieved from the any internet or cloud. Cloud Security consists of set of policies to protect data, applications and infrastructure of cloud computing. In proposed system, the secure cloud data distribution in clouds provides data confidentiality, truthfulness and data access control. The secure cloud data sharing method encrypts a data file with anonly encryption key. Two different key segments for everyone of the users are engendered, with the user only receiving one segment. Thereby, security level is increased in the cloud databases by using the privilege based hierarchy values. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
9 (RLIN) |
4622 |
Topical term or geographic name entry element |
Computer Engineering |
773 0# - HOST ITEM ENTRY |
International Standard Serial Number |
2349-6835 |
Place, publisher, and date of publication |
Nagercoil i-manager Publication |
Title |
i-manager's journal on cloud computing (JCC) |
856 ## - ELECTRONIC LOCATION AND ACCESS |
URL |
https://www.imanagerpublications.com/article/16160/23 |
Link text |
Click here |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Koha item type |
Articles Abstract Database |