IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND EDGE DATA INTEGRITY CHECKING IN EDGE CLOUD
Abstract
Abstract: - Great demand over remote data accessibilities with more flexible and efficient manner people tend to use cloud computing architecture more and more these days and became a trending technical platform. Especially at the computing services in handling distributed information systems demands more reliable client data processing more securely. Today's modern strategies need to adopt lightweight remote data access support system that processes data more effectively and efficiently. So by adopting edge computing we could be in a situation to contribute IT services over distributed platforms and makes us provide vendor services in a wider range in fulfilling service level agreements for cloud users with more and more effective strategies. So we recommend this Data integrity over edge computing platform that strives to achieve vendor side inspection and avoid malicious attacks to achieve service vendor satisfaction in a better way. So primary emphasis in handling data integrity evaluation policies efficient way to solve security issues that are over platforms. Thus policies should be framed in such a way computationally strict standards have to be adopted in the process of evaluation of client's authorization and client service transactional interactions towards secure availability of Data services over clouds.Keywords:- Edge data integrity, edge computing, service vendor, privacy protection.
Full Text PDF
IMPORTANT DATES
Submit paper at ijasret@gmail.com
Paper Submission Open For |
October 2024 |
UGC indexed in (Old UGC) |
2017 |
Last date for paper submission |
30th October, 2024 |
Deadline |
Submit Paper any time |
Publication of Paper |
Within 15-30 Days after completing all the formalities |
Publication Fees |
Rs.6000 (UG student) |
Publication Fees |
Rs.8000 (PG student)
|
|