Please use this identifier to cite or link to this item: https://gnanaganga.inflibnet.ac.in:8443/jspui/handle/123456789/16473
Title: Secured and Optimized Application Delivery Service In Public Cloud
Authors: Sengottaiyan, N
Gnanaprakasam, T
Rajesh Sharma, R
Sungheetha, Akey
Chinnaiyan, R
Hamsanandini, S
Keywords: Application Delivery Service
Application Security
Cloud Application
Optimized Application
Secure Cloud
Issue Date: 2024
Publisher: 4th International Conference on Innovative Practices in Technology and Management 2024, ICIPTM 2024
Institute of Electrical and Electronics Engineers Inc.
Citation: pp. 1-5
Abstract: With cloud computing, resources such as storage and computation are hosted in a centralized location and made accessible to many users on demand through an internet connection. It is a method of accessing a shared pool of computer resources on demand from any locale with little administrative effort. Private and public clouds are now viable options for users and enterprises of all sizes to store and process data (Third-party server). Data access methods are simplified and made more reliable with an internet connection. It may be done anytime and anywhere at a reduced price. When discussing what is meant by "cloud computing,"it is important to distinguish between the various service types (SaaS, PaaS, IaaS, SEaaS), features (On-demand service, Broad Network Access, Resource pooling, Rapid Elasticity, Measured Service), and deployment strategies (Public, Private, Community, Hybrid, and Mobile Cloud). The Cloud's flexibility has led to a mass exodus of data. A fundamental challenge for present-day cloud computing storage infrastructures is providing highly secure and efficient data access. Users are drawn to cloud storage for the considerably expanded capacity it provides. Data security must be a top priority. A severe security risk arises when private information is stored off-site outside the user's reach. Due to the vulnerability of data during transmission and storage, data security is crucial. Several different algorithms may be used for cryptography. Data encryption techniques exist, including DES, AES, and Triple DES. In symmetric critical approaches, the key is utilized for both encryption and decryption. In contrast, RSA, ECC, and homomorphic equations are examples of asymmetric cryptosystems, which need two separate keys for encryption and decryption. However, these algorithms can be broken by anybody with enough time and effort. Therefore, it is crucial to improve cloud storage security. This research aims to improve the safety and efficiency of application delivery services hosted on the Cloud. © 2024 IEEE.
URI: https://doi.org/10.1109/ICIPTM59628.2024.10563300
https://gnanaganga.inflibnet.ac.in:8443/jspui/handle/123456789/16473
ISBN: 9798350307757
Appears in Collections:Conference Papers

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.