Identifying Misuse of Data In Cloud
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 10
Abstract
Cloud Storage Enables Users To Store Their Data Offering strong data protection to cloud users while enabling rich applications is a challenging task. We explore a new cloud platform architecture called Data Protection as a Service, which dramatically reduces the per-application development effort required to offer data protection, while still allowing rapid development and maintenance. Proposing a different approach for securing data in the cloud using offensive decoy technology.
Authors and Affiliations
K. S. R. Chaitanya, T. Rajendra Prasad
Sprinkling Data Prevents From Intruders
The habitual communication of delay-tolerantnetwork (DTN) model is having partial infrastructural model for prevailing mobile patronsfor instance Bluetooth and Wi-Fi Direct. Mobile ad hoc network is an anthology of mo...
Novel Mechanisms for Secure Data Forwarding In CWSN
Efficient data transmission is one of the generally imperative issues for wireless sensor networks (WSNs). In the intervening time, many WSNs are position in harsh, disused and often adversarial physical environments...
A System To Minimize The Storing And Managing Secret Keys Expense Using Kac In Cloud
Information outsourcing which helps in the arrangement need organization of corporate information. It is likewise utilized as a core innovation at the back of various online services for individual applications. Comm...
LACK OF TRAINING DATA IN SENTIMENT CLASSIFICATION: CURRENT SOLUTIONS
In recent years, sentiment classification has attracted much attention from natural language processing researchers. Most of researchers in this field consider sentiment classification as a supervised classification p...
http://www.ijrcct.org/index.php/ojs/article/download/1245/pdf
It is pleasing to offer differentiated access services such thatdata access policies are distinct over user attributes or roles,which are direct by the key authorities. We propose a securedata recovery scheme using C...