International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 176 - Number 37 |
Year of Publication: 2020 |
Authors: Rupal Yadav, Kaptan Singh, Amit Saxena |
10.5120/ijca2020920456 |
Rupal Yadav, Kaptan Singh, Amit Saxena . Privacy Concerns Impact in Cloud Computing Environment. International Journal of Computer Applications. 176, 37 ( Jul 2020), 11-15. DOI=10.5120/ijca2020920456
'Cloud' is a generic term for a large variety of innovations and opportunities. This isn't development, but rather a "practical breakthrough," incorporating a variety of previous innovations into anything unique and informative. Cloud storage applies to the delivery of on-demand computing resources via a cloud network, such as software, repositories, file services, emails, etc. Both information and apps are completely contained on the user's device in the conventional computing system. In cloud services, the customer's machine may contain almost no technology or information (maybe just a simple operating system and a web browser), serving as nothing more than a display interface for operations that take place far away on a communications network. Cloud computing is a paradigm that provides fast, on-demand access to a separate fund of customizable computer resources (e.g. routers, databases, memory, software, and facilities) that can be quickly distributed and distributed with minimal effort to manage or interact with service providers. Cloud computing offers computing, technology, access to data, and space resources which do not involvemiddle-user understanding of the physical location and configuration of the computers delivering the services. Parallels to this conceptcan be taken from the power grid, where middle-users burn fuel without understanding the components or resources required to deliver the service. For project work, a safety system with authentication will be put in place. The proposed solution will bring the RC6 & AES Cryptography Authentication Function. Subsequently, an authentication table may also be set up towards the end of the application server to ensure that the user can access what they want.