ENERGY CONSERVATION IN CLOUD ENVIRONMENTS USING ALTERNATIVE EMAIL-ID APPROACH
Journal Title: International Journal on Computer Science and Engineering - Year 2014, Vol 6, Issue 5
Abstract
(100%)Cloud computing is a new Model for deliver and accessing the services over the Internet. So cloud provider responsibility to verify the user or client is Authorized or not.For this purpose cloud provider shall provide some Authencatation mechanism and satisfying that cloud provider concludes that the client is Authorized. During the verification of authorizatation mechanism,In . Traditional way cloud provider uses the password and Biometric authentication mechanism. During this process Cloud provider shall maintain the large database for storing the biometric parameters like finger print ,images etc..and need a Computational resources to verifying that. Here it’s the problem for wastage the resources. To Eliminate the for maintaining the Large database and computational resources we proposed a technique called Alternative E-Mail- ID+UniqueIdentatification Number (UIN)+Person identity information approach for Authentication purpose for cloud providers.
Authors and Affiliations
B. KrishnaPrasad , Dr. K. Tirupathirao , G. C. N. Mahesh
Content Aware Media Retargeting for still images using Seam Carving
When changing height and width of image traditional techniques for image resizing are oblivious to the content of image. A simple operator seam carving is used for image and video retargeting. This seam carving operator...
Performance Evaluation of Mutation / Non- Mutation Based Classification With Missing Data
A common problem encountered by many data mining techniques is the missing data. A missing data is defined as an attribute or feature in a dataset which has no associated data value. Correct treatment of these data is cr...
An Efficient Method for Detection of Copy-Move Forgery Using Discrete Wavelet Transform
Copy-Move forgery is a specific type of image forgery, in which a part of digital image is copied and pasted to another part in the same image. This paper describes blind forensics approach for detecting Copy-Move forger...
Hypothetical Description for Intelligent Data Mining
Intelligent data mining is to use the intelligent search to iscover information within data warehouses those queries and reports cannot effectively reveal and to find the patterns in the data and infer rules from them,...
The State Space Average Model of Buck- Boost Switching Regulator Including all of The System Uncertainties
In this paper a complete state-space average model for the buck-boost switching regulators is presented. The presented model includes the most of the regulator’s parameters and uncertainties. In modeling, the load curren...