RFID through Network Security in Cloud Computing Environment
| Vol-4 | Issue-09 | September-2017 | Published Online: 05 September 2017 PDF ( 207 KB ) | ||
| Author(s) | ||
| Devendra G. Pandey 1 | ||
| Abstract | ||
In this research paper we discuss security techniques in an effort to be used for facts confidentiality .in addition for providing the enhanced safety in cloud computing technology, authentication and authorization strategies are being used. In our research paper we are make a look on a number of them. Cloud computing is a quickest mounting that is primarily based on internet. It assists the users to perform offerings through using large poll of resources without set up of any software. Implementation of this generation in distinctive regions is growing rapidly due to its many benefits like cost discount, reliability, elasticity, flexibility and many extra. The recognition of cloud computing, it has to seem for many complexities together with security this is one of the fundamental inhibitors in the growth of cloud computing. Cloud Computing transfer customers software and databases to the massive statistics centers, information and services supplied by way of cloud companies may not be manipulate reliably. |
||
| Keywords | ||
| network security, cloud computing, environment | ||
|
Statistics
Article View: 389
|
||

