Volume 19 No 4 (2021)
Download PDF
Strong Storage and Security Policy for Cloud Servers with Hybrid Secure Replication
Megha Singh , Dr. Sunita Gond
Abstract
Cloud computing technology enables users to deploy shared infrastructure and
services. The internet and other public networks must be used in order to build up
a public cloud. The system is very vulnerable to a variety of security
vulnerabilities because to its reliance on open routes of communication. This has
implications for authentication and data access security
Keywords
Cloud computing, storage, security, ECC, MD5
Copyright
Copyright © Neuroquantology
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Articles published in the Neuroquantology are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJECSE right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.