Statistical Analysis of Data Access Techniques in Cloud

Authors

  • Ashtankar N Department of Computer Science & Engineering, Jhulelal Institute of Technology, Nagpur, India
  • Mulchandani M Department of Computer Science & Engineering, Jhulelal Institute of Technology, Nagpur, India

Keywords:

Cloud Computing, data access, compression techniques

Abstract

As per recent trend, cloud computing is the most high in demand, reliable and efficient technology. There are amazing benefits that are available with cloud computing like minimum investment cost, tremendous storage space, virtualization, resource sharing. The Cloud users are beneficial with this technology as they can use the large volume of data in cloud and access it anytime, anywhere easily from any corner of the world. This is achievable in pay per use or pre-paid basis. As this is a pro it also has cons, i.e security and Market competition. Many users can request for data, so, technologist need to ensure they authenticate and authorize the users to access this data. This is achievable thru access control schemes which not only allows a authenticated and authorized user to access the data but also can deny access to malicious user. In this paper we are discussing the same pain area i.e existing access control schemes along with Analysis and techniques to improve the speed of data access.

References

[1] http://commons.apache.org/proper/commonsmath/download_math.cgi , accessed 11 March 2016

[2] IET Commun., 2017, Vol. 11 Iss. 10, pp. 1558 1565 © The Institution of Engineering and Technology 2017

[3] http://www.ijritcc.org/download/browse/Volume_5_Issues/November_17_Volume_5_Issue_11/1510653367_14-11-2017.pdf

[4] Majumder, A., Namasudra, S., Nath, S.:„Taxonomy and classification ofaccess control models for cloud environments‟. in Mahmood, Z.(Ed.):„Continued rise of the cloud‟ (Springer, 2014), pp. 23–53

[5] Schuster, F., Costa, M., Fournet, C., et al.:VC3: trustworthy data analytics inthe cloud usingSGX‟. Proc. of the IEEE Symp. on Security and Privacy, SanJose, CA, May 2015, pp. 38–54.

[6] Zhu, Y., Hu, H., Ahn, G.J., et al.: „Towards temporal access control in cloudcomputing‟. Proc. of the IEEE INFOCOM, Orlando, FL, March 2012, pp.2576–2580.

[7] Ma Mingli, “Study and Realization of Comprehensive Service Platform Based on Cloud Foundry,”Dalian: School of Computing, Dalian University of Technology, 2014

[8] Yang Zhaohua and Yang Haojie,“SOA Enterprise Framework Design Based on Cloud Computin],”Computer Disc Software and Application, 2012.

[9] W. Treesinthuros, "E-commerce transaction security model based on cloud computing," in 2012 IEEE 2nd International Conference onCloud Computing and Intelligence Systems, 2012, pp. 344-347.

[10] G. Hemlata, D. Hema, and R. Ramaswamy, "Developing a Cloud- Computing Adoption Framework," Global Business Review, vol. 16, pp.632–651, 2015.

[11] M. Naderpour, J. Lu, and G. Zhang, "An intelligent situation awareness support system for safety-critical environments," Decision SupportSystems, vol. 59, pp. 325-340, 2014.

[12] C. Diwaker and P. Dembla ,“Survey on CloudComputing”, International Journal of Advanced Research in Computer Science, vol. 5, no. 5, May-June 2014, pp. 53-55.

[13] Allen, I.E., Seaman, J. Changing Course: Ten Years of Tracking Online Education in the United States, Oakland, Babson Survey Research Group and Quashog Research Group, LLC. (2013)

[14] A systematic literature review of software requirements prioritization research. Information &Software Technology 56(6): 568-585 (2014)

Downloads

Published

2025-11-25

How to Cite

[1]
N. Ashtankar and M. Mulchandani, “Statistical Analysis of Data Access Techniques in Cloud”, Int. J. Comp. Sci. Eng., vol. 7, no. 12, pp. 75–77, Nov. 2025.