Rs 5670 only/-
The cloud computing has a rich area of applications and the importance is increases as the applications become more intelligent. In this presented work the cloud computing and their applications are investigated. Additionally main focuses is placed on the different approaches of cloud computing security.
Trusted Authority
In this section it is assumed that each cloud storage manager is known as the trusted authority where it create some data authority for distributing its work load among those. This distribution of work among the domain authority is termed as the load balancing. Here trusted authority has the power to add or delete domain authority in other words no domain authority has power to create other domain authority. Each domain authority has its own user id and password to get login on the servers.
Domain Authority
In this section cloud storage manager is created helping hands known as the domain authority can create some data owner for balancing its work load among those. This distribution of work among the domain authority is termed as the load balancing. Here domain authority has the power to add or delete data owner in other words no data owner has power to create other data owner. Each data owner has its own userid and password to get login on the servers.
IEEE Base paper | |||
Doc | Complete Project word file document | ||
Read me | Complete read me text file | ||
Source Code | Complete Code files |