A Study About Repetition of Group of Data and Avoid the Problem
Keywords:
Database, cloud computing, encryption, decryption, securityAbstract
Technology is improving day by day, to manage technology by time and trend. To share data in many ways, such as share it, whatsapp, facebook hike and Twitter By using these apps, sharing and storing the data is easy. Technology is improved by innovation and renovation. Cloud is used to store the big data. Users share information through multiple group members in the cloud with low maintenance and costs. Data owner is not able to control over their data. Various techniques are used to support user privacy and data sharing. The use of the mobile devices in cloud computing environment to various kinds of attacks like, unauthorized access. This paper introduces on how to avoid the repetition of data using normalization forms.
References
[1]B .V. varshini, M.Vigilson prem, J.Geethapriya “A review on secure data sharing in cloud computing environment” (ISSN: 2278-1323) vol 6, issue 3, March 2017.
[2] Sathishkumar eswarmoorthy, chunduru anilkumar, usha moorthy, saravan kumar “Review on Dynamic Group Data Sharing in Cloud Environment” (ISSN: 646-656)
[3]Jiale zhang, Bing Chen, yanchao zhao, xiang cheng, and feng hu “Data Security and privacy preserving in edge computing paradigm: survey on open issues”vol7, issue4, April 23, 2018.
[4]Ahmad shah1, dr.penmesta V Krishna raja2 “Security and Privacy for Group Data Sharing Mobile Computing Enviornment” (ISSN 2394-4099)
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
