Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Hoc Network

Abstract

Cloud computing is a new paradigm of shifting resources over the network so that the user can access the resources over the network. The resource mainly consists of Platform as a service, Software as service, and infrastructure as a service. Cloud computing is a basically internet based computing where the services are provided on pay as you go model. The consumers pay for the services they want and services are provided to them on cloud. Since cloud uses distributed resourcing scheme it is important to provide security in the cloud. And we also know that security is the main problem in cloud. It is mainly the loop hole in cloud which requires serious attention. In this paper we have described the scheme to implement security in cloud using finger print reader and GSM module. In this paper first we have discussed the security issues and security problem and we have enlighten the steps to increase the security in cloud. Our methodology mainly focuses on finger print scanner and GSM module. Bilal Hussain Ch | Subayyal "Securing Cloud Data with the Application of Image Processing" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18454.pdf

Authors and Affiliations

Keywords

Related Articles

Burning Issue of Burning Amazon Rainforest A Comparative Analysis

The paper is a presentation of the covering upon of all the prime issues social, political, cultural or natural, which are responsible for the happening of the Amazon rainforest fires, which is very immediate and current...

3D Printing Technology The Impetus Concept in the Drug Delivery

The 3D printing technique is a highly turbulent approach nowadays in pharmaceutical technology. It is the continuous improvements towards the latest concept in the drug improvement to understand the better quality of the...

Transient Thermal Analysis for Heat Dissipation from Engine Cylinder Block with Different Shaped Holes in Fins using CFD

The cost of fuel and materials in all sectors is rising day by day. In the IC engine, the engine fails primarily because the heat transfer from the cylinder wall to the ambient air is inadequate. Heat is derived from the...

Philosophical Analysis of the Aspects of Genius and Talent

In the twenty first century in a global society and a tremendous increase in the flow of information, the problems of genius and talent acquire special significance not only in various fields of knowledge, but also in su...

Study of Contractual Labour in India

Today India is among the fastest developing economy in the world. Pace of Industrialization, and foreign direct investment has increased phenomenally. This has given birth to the many new small, medium and large scale in...

Download PDF file
  • EP ID EP410541
  • DOI -
  • Views 78
  • Downloads 0

How To Cite

(2018). Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Hoc Network. International Journal of Trend in Scientific Research and Development, 2(6), 434-439. https://europub.co.uk/articles/-A-410541