Loading

A Secured Data Prevention Method in Cloud Computing Process
M Jaya Bhaskar1, V Sathvikis2, S Harsha Sai3, K Harsha Vardhan4

1Dr. M Jaya Bhaskar, Department of Computer Science, Koneru Lakshmaiah Education Foundation, Vijayawada (Andhra Pradesh), India.
2V Sathvikis Currently Student, Department of Computer Science, Koneru Lakshmaiah Education Foundation, Vijayawada (Andhra Pradesh), India.
3S Harsha Sai, Currently Student, Department of Computer Science, Koneru Lakshmaiah Education Foundation, Vijayawada (Andhra Pradesh), India.
4K Harsha Vardhan, Student, Department of Computer Science, Koneru Lakshmaiah Education Foundation, Vijayawada (Andhra Pradesh), India.
Manuscript received on 19 January 2020 | Revised Manuscript received on 02 February 2020 | Manuscript Published on 05 February 2020 | PP: 111-115 | Volume-8 Issue-4S5 December 2019 | Retrieval Number: D10371284S519/2019©BEIESP | DOI: 10.35940/ijrte.D1037.1284S519
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: This paper proposes protecting data by using data security and it is considered tointroducealteration, inspection, intrusion, and footage. Cloud computing may be a kind of online based computing that grants approaches of PC and various devices depending on resources and necessary information. It is an ideal that empowers entirely on the prevention and control of configurable computing resources. Now a days security is a major problem in developing cloud computing so efficient debugging of cloud computing is a successful model by security in cloud presentations. The present work is a part of cryptography in cloud computing for getting better information safety. Here we approach another security for cryptography to get secured information at cloud data centres.
Keywords: Sensitive Data Management, Information Security.
Scope of the Article: Cloud Computing

Welcome Stranger! This is an example Text for your fantastic Promo Box! Feel Free to delete it and replace it with your own fancy Message!