Secure data transmission with cloud computing in heterogeneous wireless networks

2012 ◽  
Vol 5 (12) ◽  
pp. 1325-1336 ◽  
Author(s):  
Chung-Hua Chu ◽  
Yen-Chieh Ouyang ◽  
Chang-Bu Jang

Our economic assets are limited, yet our valuation necessitates seems to be boundless. The requirement meant for valuation remedies continues growing inconclusively, no matter the accessibility of assets, the requirement for further continues. Now the cloud does its job, Cloud Computing (CC) acquires its title as a metaphor for the web. In general, the web is spoken to within the system figure like a cloud. The cloud symbol speaks to the entire so as to further objects to facilitate the system function. Various businesses is being gradually moving to the utilization of CC, since CC vows toward slash functional as well as investment expense also all the further significantly consent to Software sectors center around intentional activities as an alternative of maintaining the information hub operating. Guaranteeing the protection of CC is a key aspect within the CC condition, like clients frequently piles up touchy data through cloud repository suppliers, yet those suppliers might be dishonest. On the way to guarantee the protection as well as rightness of users information within the cloud, this document recommends another pattern on behalf of information safety in CC.


2021 ◽  
Author(s):  
Anurag Srivastava ◽  
Abhishek Singh ◽  
Susheel George Joseph ◽  
M. Rajkumar ◽  
Yogini Dilip Borole ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document