Cloud computing provides dynamically scalable and virtualized resources as a service over the network at a nominal initial investment. Data-center works as backbone in cloud computing there a large number of servers are networked to host computing & storage needs of the users. We study and seek to improve the confidentiality of application data stored on third-party computing clouds. Scalable database services allow data query only by primary key rather than supporting secondary-key or join queries. We propose to identify and encrypt all functionally encrypt able data, sensitive data that can be encrypted without limiting the functionality of the application on the cloud. Many data intensive applications produce enormous amounts of data which travel on cloud network. As the cloud users grow, cloud architecture should accommodate movement of voluminous data to avoid data congestion in the network. Many other applications such as payment and online auction services cannot afford any data inconsistency. Cloud computing model provides benefits for private enterprise environments where a significant physical infrastructure already exists. Private cloud management platforms have been emerging in the last several years providing new opportunities for efficient management of internal infrastructures leading to high utilization.
[1]
Rajkumar Buyya,et al.
CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms
,
2011,
Softw. Pract. Exp..
[2]
Chetna Dabas,et al.
A Cloud Computing Architecture Framework for Scalable RFID
,
2010
.
[3]
Alessandro Orso,et al.
Penumbra: automatically identifying failure-relevant inputs using dynamic tainting
,
2009,
ISSTA.
[4]
Randy H. Katz,et al.
Above the Clouds: A Berkeley View of Cloud Computing
,
2009
.
[5]
David Molnar,et al.
Self Hosting vs. Cloud Hosting: Accounting for the Security Impact of Hosting in the Cloud
,
2010,
WEIS.