RFID through Network Security in Cloud Computing Environment

Vol-4 | Issue-09 | September-2017 | Published Online: 05 September 2017    PDF ( 207 KB )
Author(s)
Devendra G. Pandey 1
Abstract

In this research paper we discuss security techniques in an effort to be used for facts confidentiality .in addition for providing the enhanced safety in cloud computing technology, authentication and authorization strategies are being used. In our research paper we are make a look on a number of them. Cloud computing is a quickest mounting that is primarily based on internet. It assists the users to perform offerings through using large poll of resources without set up of any software. Implementation of this generation in distinctive regions is growing rapidly due to its many benefits like cost discount, reliability, elasticity, flexibility and many extra. The recognition of cloud computing, it has to seem for many complexities together with security this is one of the fundamental inhibitors in the growth of cloud computing. Cloud Computing transfer customers software and databases to the massive statistics centers, information and services supplied by way of cloud companies may not be manipulate reliably.

Keywords
network security, cloud computing, environment
Statistics
Article View: 389