Online Proffering Approach with Secure Manner using Scrambled Technique
Journal Title: Engineering and Scientific International Journal - Year 2017, Vol 4, Issue 3
Abstract
This paper proposes the secured cloud proffering with scrambled technique and uses the Hardware Security Module (temporary storage) to store automatic generating keys for encryption, decryption, and authentication which isolates the cloud user data from potentially malicious domains or cloud administrators. Within the secured environment, the hardware security module provides essential security functionality with automatically generated keys for data in storage. Such limitations avoid the cloud administrator from distressing the security of the Guest Users. This system not only defends against wide attacks but also for the small TCB. This paper discusses the software operation of the proposed Proffering approach with safety unit, analyzes the security and presents its performance results. This system provides three methods of cloud security. The connection is secured. There will be secured platform between the cloud user and the cloud admin.
Authors and Affiliations
Manjula A
A novel approach for Liver disorder Classification using Data Mining Techniques
Data mining is an integrated platform for all other soft computing techniques and which is used to identify the expected or probable values from a large storage by using computational algorithms. This paper describes the...
Mobile Ad-Hoc Social Networks in Android Platform-A Survey
— Ad-hoc social networks are required by people to strengthen local communication between them. Social media is the main aim on social network face-to-face communication is less useful for file sharing and group discussi...
Fraud Detection Using Data Mining Techniques
The purpose of this study is to develop a data mining model for fraud detection in various fields such as online transactions (i.e) net banking, tax payers, credit cards etc. and securing data from the third parties(intr...
Randomized Image Password and a QR Code Based Circumnavigation Mechanism for Secure Authentication using caRP
Password is the security primitives used for proving a user identity in online. Many graphical password techniques have been proposed which is used to improve password usability and security. In this paper, we present a...
Predicting the Risk Factors of Endometrial Cancer using Data Mining
Data mining act as an imperative part for uncovering new idea in healthcare organization which is supportive for all the parties related with medical field. This paper analyses the effectiveness of Data mining technique...