|
|
Bimonthly Since 1986 |
ISSN 1004-9037
|
|
|
|
|
Publication Details |
Edited by: Editorial Board of Journal of Data Acquisition and Processing
P.O. Box 2704, Beijing 100190, P.R. China
Sponsored by: Institute of Computing Technology, CAS & China Computer Federation
Undertaken by: Institute of Computing Technology, CAS
Published by: SCIENCE PRESS, BEIJING, CHINA
Distributed by:
China: All Local Post Offices
|
|
|
|
|
|
|
|
|
|
Abstract
Secure online information services are increasingly being provided using cloud computing. The ability to access data from any location is only one of the many benefits of cloud computing, which also includes not having to worry about backups or setting up disaster recovery and business continuity centres. However, cloud computing raises concerns regarding the appropriate management of such data and interactions by cloud service providers, end-user organisations, and governments. If you run a large organisation or are an individual who needs a wide range of network services at a low total cost, cloud computing is quickly becoming the most popular option. Data on individuals is often stored in the open Cloud, where it may be accessed by anybody. When compared to the adaptable services offered by cloud providers, this fundamental creates a wide range of problems.
Keyword
Distributed Algorithm, Distributing, Steganography
PDF Download (click here)
|
|
|
|
|