RSA Algorithm achievement with Federal information processing Signature for Data protection in Cloud Computing
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2012, Vol 3, Issue 1
Abstract
Cloud computing presents IT organizations with a fundaÂmentally different model of operation, one that takes advantage of the maturity of web applications and networks and the rising interoperability of computing systems to provide IT services. Data security is becoming a core problem in cloud computing, there are some kind of solution that are provide some security with model, some technology. In this paper is attempt to secure data from unauthorized access, the Method of data security is RSA algorithm for providing data security by encrypting the given data based on the KEY combinations. And this data then can only be decrypted by authorized person by using his private key. For the same purpose Google application cloud has been implemented on IJCT Foundation, all data has of IJCT Foundation sifted to Google cloud and RSA security algorithm is implemented by us for secure data.
Authors and Affiliations
Abhishek Patial, Sunny Behal
Printed Telugu Numeral Recognition based on Structural, Skeleton and Water Reservoir Features
Selection of feature extraction method is most important factor in achieving high recognition performance in automatic numeral recognition systems In this paper, a new proposed s...
Performance Analysis of Handoff in CDMA Cellular System
Handoff mechanism is extremely important in cellular network because of the cellular architecture employed to maximize spectrum utilization. This unique feature has driven the rapid growth in the mobile network industry,...
A Review on associative classification for Diabetic Datasets A Simulation Approach
Association rules are used to discover all the interesting relationship in a potentially large database. Association rule mining is used to discover a small set of rules over the database to form more accurate evaluation...
A REVIEW ON COMPUTER AIDED DETECTION AND DIAGNOSIS OF LUNG CANCER NODULES
In this paper, a attempt has been made to summarize some of the information about CAD and CADx for the purpose of early detection and diagnosis of lung cancer. Computer Aided Detection (CADe) and Computer Aided Diagnosis...
Exploitnig DNS Server Vulnerabilites Using Linux Operating System
Today, the world is using many modern Information Technology (IT) systems to gather, store, and manipulateimportant information. On the other hand, hackers are trying to gain access to any computer or system for viewing,...