A Unified System to Ensure Data Security In Cloud Computing
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 11
Abstract
Cloud computing is the concept implemented to crack the daily computing problems, likes of hardware, software and resource availability unhurried by computer users. Although cloud computing promises lower costs, rapid scaling, easier maintenance, and service availability anywhere, anytime, a key challenge is how to safeguard and build confidence that the cloud can handle user data securely. Since cloud computing is rest on internet, security issues like privacy, data security, confidentiality, and authentication is encountered. In order to get rid of the same, I have preferred to make use of a combination of Symmetric (AES) and Asymmetric key cryptography (RSA) together to offer Confidentiality, Authentication &Integrity.
Authors and Affiliations
Sagar Pudi
Video Frame Retrieval Using Effective Query Processing
Video frame retrieval from a long video sequence is atypical known problem to many of us. In this work we have discussed a graph transformation and matching approach to the problem. We introduce a query algorithm to...
Automated Sentiment Analysis System Using Machine Learning Algorithms
Sentiment analysis can be very useful for business if employed correctly. In this article, I will attempt to demystify the process, provide context, and offer some concrete examples of how businesses can utilize it....
Android Application on Examination Using Speech Technology for Blind People
A number of developing countries continue to provide educational services to students with disabilities in "segregated" schools. Trends in provisions in India reflect that the leading policy predisposition before the...
A dynamic variant of AP clustering to achieve comparable clustering performance
AP clustering is a model based system that fathoms by handover every information point to its closest model, where models are recognized by passing messages on bipartite chart. There are two sorts of messages going o...
An Enhanced Digital Campus Security System Using RFID, GPS, GSM
In this paper a Digital Campus Security System (DCST) has been designed and implemented base on the RFID, GPS and Gsm network. DCST reads the RFID tags and sends information to lpc2148.processor gives alerts through...