Improving Data Storage Security in Cloud Computing Using RC6 Algorithm
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2017, Vol 19, Issue 5
Abstract
In spite of the huge advantages got from the selection of cloud computing idea, its famous adoption has been determined usually by security concerns. The broadened assault surface in a cloud environment makes it more defenseless against existing and developing security dangers. Customary information security approaches have been discovered inadequate in abridging these dangers and this obnoxious pattern has required the requirement for an advanced methodsto deal with datasecrecy. This paper proposes an improved component to guaranteeing information security by utilizing RC6algorithm. we went for utilizing the quality of these techniques to gains a powerful instrument for guaranteeing secrecy and integrity of information in the cloud .The results obtained from proposed system shows that ability to resistance the threats and attacks and able to keep user’s data secure and trusted .
Authors and Affiliations
Prof. Dr. Salim Ali Abbas, Malik Qasim Mohammed
A Study of vampire Attack to Avoid the Intruders without Backtracking Method
Abstract: In a Wireless sensor network, every hub gathers the information and transmits all the information parcels to the sink hub utilizing any directing conventions. The directing Protocols are intended to be se...
Detecting Anomaly IDS in Network using Bayesian Network
In a hostile area of network, it is a severe challenge to protect sink, developing flexible and adaptive security oriented approaches against malicious activities. Intrusion detection is the act of detecting, mon...
An Efficient Methodology for Clustering Uncertain Data Based on Similarity Measure
Abstract: In data mining clustering is one of the most important and crucial task. There exists various clustering techniques like partitioning and density based techniques. The previous methods worked on traditional par...
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying Queue Length and Dynamic TTL Value in MANET
A Mobile ad-hoc network (MANET) is a network, self-configuring, proficient of self-directed functioning, quickly deployable and operates without infrastructure. MANET operates without any centralized administrati...
Restoration and Enhancement of Underwater Image based on Wavelength Compensation and Image Dehazing Technique
Abstract: Getting clear images in underwater environments is an important issue in ocean engineering . Thequality of underwater images plays a important role in scientific world. Capturing images underwater is diff...