Reference Hub2
Analysis of Heterogeneous Data Storage and Access Control Management for Cloud Computing Under M/M/c Queueing Model

Analysis of Heterogeneous Data Storage and Access Control Management for Cloud Computing Under M/M/c Queueing Model

Divya Sharma, Gireesh Kumar, Richa Sharma
Copyright: © 2021 |Volume: 11 |Issue: 3 |Pages: 14
ISSN: 2156-1834|EISSN: 2156-1826|EISBN13: 9781799862468|DOI: 10.4018/IJCAC.2021070104
Cite Article Cite Article

MLA

Sharma, Divya, et al. "Analysis of Heterogeneous Data Storage and Access Control Management for Cloud Computing Under M/M/c Queueing Model." IJCAC vol.11, no.3 2021: pp.58-71. http://doi.org/10.4018/IJCAC.2021070104

APA

Sharma, D., Kumar, G., & Sharma, R. (2021). Analysis of Heterogeneous Data Storage and Access Control Management for Cloud Computing Under M/M/c Queueing Model. International Journal of Cloud Applications and Computing (IJCAC), 11(3), 58-71. http://doi.org/10.4018/IJCAC.2021070104

Chicago

Sharma, Divya, Gireesh Kumar, and Richa Sharma. "Analysis of Heterogeneous Data Storage and Access Control Management for Cloud Computing Under M/M/c Queueing Model," International Journal of Cloud Applications and Computing (IJCAC) 11, no.3: 58-71. http://doi.org/10.4018/IJCAC.2021070104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

This study focuses on challenges faced during optimization of the performance of multiple users under encrypted data storage. Traditional single storage instance schemes are much concerned about the application scenarios rather than data sensitivity. This paper provides an optimization function for analyzing the performance parameters of developed queueing system. On the other hand, simulation results are further examined in order to optimize the average waiting time, average queue length, and total number of data packets. In addition, deduplication check provides more storage by eliminating duplicate files, and the remaining files further get encrypted by two cryptographic algorithms, namely advanced encryption standard (AES) and Rivest–Shamir–Adleman (RSA), respectively. Moreover, this paper emphasises performance of data in terms of storage and security; on the same basis, its comparison and implementation has been done. At last, conclusion is given.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.