A Unified System to Ensure Data Security In Cloud Computing
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 11
Abstract
Cloud computing is the concept implemented to crack the daily computing problems, likes of hardware, software and resource availability unhurried by computer users. Although cloud computing promises lower costs, rapid scaling, easier maintenance, and service availability anywhere, anytime, a key challenge is how to safeguard and build confidence that the cloud can handle user data securely. Since cloud computing is rest on internet, security issues like privacy, data security, confidentiality, and authentication is encountered. In order to get rid of the same, I have preferred to make use of a combination of Symmetric (AES) and Asymmetric key cryptography (RSA) together to offer Confidentiality, Authentication &Integrity.
Authors and Affiliations
Sagar Pudi
A Novel Method for Crawl Forum Threads
In internet crawler it is program that visits websites and reads their pages and other information in order to create entries for a search engine index. Now we introducing forum crawler which traverses the web forum...
In-dependable Data hiding in an Encrypted Image using FCM-DH Algorithm
In this paper, a data mining technique, Fuzzy C Means Clustering (FCM) based data hiding algorithm (FCM-DH) is used to divide pixels into classes or clusters from the encrypted image. Clustering of pixels in an encry...
Design of a CPW –Fed L slit antenna for X band application
A coplanar waveguide (CPW) fed antenna with L-slit is presented in this paper. Two L-slits are introduced both sides of the patch to reduce the resonant frequency.The antenna has been designed on a FR4 substrate with...
Improved Fused Floating Point Add-Subtract Unit
This paper presents improved architectures for a fused floating -point add–subtract unit. The fused floating -point add–subtract unit is useful for digital signal processing (DSP) applications such as fast Fourier tr...
Detecting Network And Application Layer Attacks in Networks
Distributed Denial of Service (DDoS) flooding attacks are launched by attackers disturbing server services as well as Individual users who are active in internet.espicially attackers are targeting network Transport l...