Enhancing Data Base Security in Cloud Computing
Balakrishna Reddy Kanakanti1, Subramanian EK2
1Balakrishna Reddy Kanakanti*,Student, B. Tech ,Department of computer science and engineering(CSE), Saveetha School of Engineering, Chennai, India.
2EK Subramanian, As assistant Professor(SG), at the department computer science and engineering(CSE),Saveetha school of engineering, Chennai, India.
Manuscript received on February 12, 2020. | Revised Manuscript received on February 21, 2020. | Manuscript published on March 30, 2020. | PP: 393-397 | Volume-8 Issue-6, March 2020. | Retrieval Number: E6825018520/2020©BEIESP | DOI: 10.35940/ijrte.E6825.038620
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Information security has reliably been a significant issue in data innovation. In the distributed computing condition, it turns out to be especially genuine in light of the fact that the distributed is suitable in better places even in all the globe. Distributed and security insurance are the two fundamental components of client’s worries about the cloud innovation. Despite the fact that numerous procedures on the themes in distributed computing have been researched in the two ventures, information security and security assurance are getting progressively significant for the future improvement of distributed computing innovation in government, industry, and business. Information security and protection assurance issues are significant to both equipment and programming in the cloud design. This examination is to survey diverse security methods and difficulties from both programming and equipment angles for ensuring information in the cloud and targets upgrading the information security and protection assurance for the dependable cloud condition. In this paper, we make a relative research examination of the current research work with respect to the information security and security assurance procedures utilized in the distributed computing.
Keywords: Information Security, Distributed computing, Cloud, Assurance, Innovation
Scope of the Article: Distributed Computing.