Application of Cloud Security Services for the Secured Vendor Registration

Authors

  • M. Nagaseshudu Assistant Professor (Ad-hoc) Department of Computer Science and Engineering JNTUA College of Engineering Pulivendhula, AndhraPradesh, India
  • Shaik Ghouhar Taj Assistant Professor (Ad-hoc) Department of Computer Science and Engineering JNTUA College of Engineering Pulivendhula, AndhraPradesh, India
  • C. Prabhavati Assistant Professor (Ad-hoc) Department of Computer Science and Engineering JNTUA College of Engineering Pulivendhula, AndhraPradesh, India

DOI:

https://doi.org/10.7324/IJERAT.3158

Keywords:

Data Encryptio,. Cloud services, Cloud Securit.

Abstract

Generally in current days, the business is mainly based on the network where security is the main constraint that should be considered while financial transactions, data retrieval, data storage and firm maintenance etc. The present technology provides security for all those constraints by using various encryption algorithms. In the proposed method the data is converted into different formats resulting that the stolen data may not be understandable. Here, we consider the vendor registration in which any number of vendors can be collaborated over a network to share the business plans and for firm maintenance where the security is to be considered taken into account to perform those actions. This paper focus on providing the security with the utilization of cloud services additional to conventional security mechanisms to differentiate the authorized and unauthorized vendors.

Downloads

Published

2017-12-05

How to Cite

Application of Cloud Security Services for the Secured Vendor Registration. (2017). International Journal of Engineering Research and Advanced Technology (ijerat) (E-ISSN 2454-6135) DOI: 10.31695 IJERAT, 3(12), 01-04. https://doi.org/10.7324/IJERAT.3158