CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Secure Private Cloud Server Implementation for Data Storage

by Amit Kumar Jha, Divakar Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 114 - Number 9
Year of Publication: 2015
Authors: Amit Kumar Jha, Divakar Singh
10.5120/20010-1969

Amit Kumar Jha, Divakar Singh . A Secure Private Cloud Server Implementation for Data Storage. International Journal of Computer Applications. 114, 9 ( March 2015), 39-41. DOI=10.5120/20010-1969

@article{ 10.5120/20010-1969,
author = { Amit Kumar Jha, Divakar Singh },
title = { A Secure Private Cloud Server Implementation for Data Storage },
journal = { International Journal of Computer Applications },
issue_date = { March 2015 },
volume = { 114 },
number = { 9 },
month = { March },
year = { 2015 },
issn = { 0975-8887 },
pages = { 39-41 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume114/number9/20010-1969/ },
doi = { 10.5120/20010-1969 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:52:17.768810+05:30
%A Amit Kumar Jha
%A Divakar Singh
%T A Secure Private Cloud Server Implementation for Data Storage
%J International Journal of Computer Applications
%@ 0975-8887
%V 114
%N 9
%P 39-41
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper is the implementation of private cloud software as service server; centralized remote accessibility and data storage system without internet connection in Microsoft windows server 2K8 with domain controlling . Migrating from a traditional model to the Cloud model reduce cost for enterprise customer. The main objectives of Saas provider are to minimize cost and to improve Customer Satisfaction Level (CSL)[13]

References
  1. A Secure Framework for User Data Storage in Public Cloud Systems using Symmetric Cryptography Reetika Singh1, Rajesh Tiwari2 1Research Scholar, Faculty of Engineering & Technology, 2Faculty of Engineering & Technology Department of Computer Science & Engineering, Shri Shankaracharya College of Engineering & Technology, Chhattisgarh Swami Vivekananda Technical University, Bhilai - 490006, Chhattisgarh, INDIA
  2. Cloud computing: state-of-the-art and research challenges Qi Zhang•Lu Cheng•Raouf Boutaba
  3. Cloud Computing – Issues, Research and Implementations, Mladen A. Vouk Department of Computer Science, North Carolina State University, Raleigh, North Carolina, USA
  4. Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility ,Rajkumar Buyya 1,2 , Chee Shin Yeo 1, Srikumar Venugopal 1, James Broberg 1, and Ivona Brandic 3 ,1 Grid d Computing and Distributed Systems (GRIDS) Laboratory Department of Computer Science and Software Engineering The University of Melbourne, Australia Email: {raj, csyeo, srikumar, brobergj}@csse. unimelb. edu. au ,2 Manjrasoft Pty Ltd, Melbourne, Australia.
  5. Cloud Computing Nariman Mirzaei (nmirzaei@indiana. edu) Fall 2008. ,
  6. FOSTER, I. , ZHAO, Y. , RAICU, I. and LU, S. 2008. Cloud Computing and Grid Computing 360-Degree Compared. In Grid Computing Environments Workshop (GCE '08), Austin, Texas, USA, November 2008, 1-10
  7. Corbató, F. J. , Saltzer, J. H. , and Clingen, C. T. 1972. Multics: the first seven years. In Proceedings of the May 16-18, 1972, Spring Joint Computer Conference, Atlantic City, New Jersey, May 1972, 571-583.
  8. BUYYA, R. , YEO, C. and VENUGOPAL, S. 2008. Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities. In High Performance Computing and Communications, 2008. HPCC '08. 10th IEEE International Conference on, 5-13
  9. Implementing and operating an internet scale distributed application using service oriented architecture principles and cloud computing infrastructure. In iiWAS '08: Proceedings of the 10th International Conference on Information Integration and Web-based Applications & Services, 417-421. CHANG, M. , HE, J. , and E. Leon, "Service-Orientation in the Computing Infrastructure," 2006, pp. 27-33.
  10. SEDAYAO, J. 2008
  11. PROVIDING A SECURE DATA FORWARDING IN CLOUD STORAGE SYSTEM USING THRESHOLD PROXY RE-ENCRYPTION SCHEME. S. Poonkodi1, V. Kavitha2, K. Suresh3 ,1,2Assistant Professor, Information Technology, Karpaga Vinayaga College of Engineering & Technology, Kanchipuram Dt, Tamil Nadu, India 3Assistant Professor, Computer Science & Engineering, KCG College of Technology, Chennai, Tamil Nadu, India Email Address: rkpoonkodi@gmail. com,avija2000@yahoo. com,sureshvk. 2008@gmail. com. International Journa
  12. Secure Framework for Data Storage from Single to Multi clouds in Cloud NetworkingB. Sujana1, P. Tejaswini2, G. Srinivasulu3, Sk. Karimulla41,2,3,4 QUBA COLLEGE OF ENGINEERING & TECH, NELLORE. International Journal of Emerging Trends & Technology in Computer Science (IJETTCS),Web Site: www. ijettcs. org Email: editor@ijettcs. org, editorijettcs@gmail. com,Volume 2, Issue 2, March – April 2013 ISSN 2278-6856.
  13. Implementation of Data Security in Cloud Computing G. Jai Arul Jose1, C. Sajeev2 1,2 Research Scholar, Sathyabama University, Chennai, INDIA. International Journal of P2P Network Trends and Technology- July to Aug Issue 2011ISSN: 2249-2615.
  14. SLA-based resource provisioning for hosted software-as-a-service application in cloud computing environments. by linlin Wn,saurabh kumar garg,steve verteeg and rajkumar Buyya. IEEE vol-7,no 3,july-september 2014
Index Terms

Computer Science
Information Sciences

Keywords

Private cloud software Time coast (TTL) reduce algorithm Customer Satisfaction Level