Submit your articles to the African Journal of Biomedical Research, active in Scopus Q3 and Clarivate Web of Science Zoological Records. Click here to submit your manuscript.
Volume 11 (2024) | Issue 5
Volume 11 (2024) | Issue 5
Volume 11 (2024) | Issue 5
Volume 11 (2024) | Issue 5
Volume 11 (2024) | Issue 5
Abstract - Confidence and security prevent businesses from fully embracing cloud platforms. To protect the clouds, providers must first secure virtualized data-center resources, uphold user privacy, and protect data integrity. The authors suggest that the trust overlay network be used through multiple data centers to implement a reputation system to build trust between service providers and data owners. Data coloring and software watermarking methods protect shared data objects and highly distributed software modules. These strategies protect multi-path authentication, enable a single sign-on in the cloud, and tighten access control for sensitive data in the public and private clouds. Protection against tampering is tamper proofing, so unauthorized changes to the software (for example, removing a watermark) can lead to passive code. We will briefly examine the technology available for each type of protection. P2P technology opens our work to low cost copyrighted content delivery. The advantages are mainly delivery cost, high content availability and copyright compliance in exploring P2P network resources.