Achieving High Secure Data Storage in Cloud Computing
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 5
Abstract
Nowadays, cloud computing has attained great prominence due to various reasons for instance, on demand resource sharing and online storage of data. It is a collection of shared pool of information, resources that makes up a cloud. In this paper, emphasis is to provide a various encryption techniques and effective security solution and also to reduce cloud storage to reduce its overhead. The various security techniques over cloud platform and show analysis of protection by using various cryptographic techniques which is most useful and helpful in the information security. This technique is a two way secured data encryption system, which focus on the matters related to user’s privacy, authentication and accuracy. The security and performance of encryption algorithms must be balanced. This paper, encryption algorithms (AES, Blowfish, RSA) has been discussed to analyze the performance level of each algorithm.
Authors and Affiliations
S. Meena, Dr. N. Kowsalya
slugA Review paper on Routing Protocol Comparison
This paper presents a broad study on the work of common MANET (mobile adhoc network) routing protocols. The routing protocols used in this study include AODV, DSR and DSDV which consist of a mixture of reactive and proa...
Influence of Curing Types on Properties of Concrete Using Slag Replacement
The influence of curing types on properties of concrete along with different percentage of cement replacement is studied. Air curing and accelerated curing are compared to water curing. Four types of mixes (i.e., with d...
Prediction of Deflection of Cantilever Beam of Any Arbitrary Length Using Soft Computation Technique
The purpose of the paper is to predict the deflection of a cantilever beam using soft computation technique. The neural networking technique is adopted here for the prediction. The large deflection of the beam is consid...
Smart Locker System to Crack Shoulder Surfing Techniques
Authentication based on passwords is used largely in applications for computer security and privacy. The password is generated for each and every time a new color code is generated for the user. The user can open the lo...
Anti-Seismic reinforcement for highway network
This paper provides a novel practical method for analyzing an anti-seismic reinforcement (ASR) problem involving hundreds of transportation facilities on an urban road network subject to multiple earthquake risks. The r...