Authorization Based Secure Data Transaction in Cloud Computing
Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2014, Vol 11, Issue 9
Abstract
Analyze in cloud computing be in the receipt of distributed process in transacting database utilize over cloud servers entities work in the evidence of authorization that are given an explanation for collection certified proof of authority. The proof and status it’s corrected and collects over the expended a point of time duration below the threat of process an authority policy of the client confident actuality not available circumstances. In this paper we focus on the felt finding of the problem we are defining the normal understanding trusted transaction when we are dealing with the proof of authorization in cloud computing and users can obtain there computation and storage to servers and it is also called cloud. Cloud can make available for use different like application ex (Google apps, what’s app) a large amount of data stored in clouds it’s highly quick to detect security and privacy. It is more important problems in cloud computing. The users must authenticate itself before initialization of any transaction it must be make sure that the cloud are other clients the cloud computing it keep the clients accounts is the facts it outsources the cloud computing itself responsible to the service part from the specialist solution make sure the secure and lack of disturbance and it is also require for code implementation.
Authors and Affiliations
V. Vamsikrishna , P. Boominathan
A NEW APPROACH TO IDENTIFY THE STEGNO IMAGE USING EIGEN VALUE AND EIGEN VECTOR METHOD
In this paper we propose a new BMP based Steganography image identification using Eigen values and Eigen Vectors Technique. This is new approach and this method is different from normal and Steganography image comp...
Ontology Learning Process Using Fuzzy Formal Concept Analysis
Currently reliable and appropriate information is difficult to find on the Internet. Bayesian networks were used earlier for probabilistic reasoning of unknown values and for determining knowledge representation. V...
Cost-effective Perturb and Observe MPPT Method using Arduino Microcontroller for a Standalone Photo Voltaic System
There has been tremendous advancements in the field of electronics recently. This had led to the realization of the hardware for the techniques like Maximum Power Point Tracking (MPPT). Low cost and simplicity are import...
Texture Feature Extraction of Video Frames Using GLCM
This paper presents a novel system for texture feature extraction of video frames using Gray Level Cooccurrence Matrix (GLCM).GLCM extraction is done using hardware. Texture is one of the important characteristics...
Bricks Rn222 Exhalation Rates in Some Samples from Different Countries
Radon concentrations in brick samples collected from different countries were measured using the sealed-can technique based on the CR-39 SSNTDs. CR-39 detectors are widely used for radon exhalation rate measurements in b...