Security Enhancement and Time Delay Consumption for Cloud Computing Using AES and RC6 Algorithm
Journal Title: Bonfring International Journal of Software Engineering and Soft Computing - Year 2019, Vol 9, Issue 1
Abstract
Cloud computing is an Internet based computing. It provides the services to the organizations like storage, applications and servers. In cloud storage User can store their data remotely without maintaining local copy of data. So the integrity verification and time delay consumption of the data is major problem in cloud storage. We ensure the data not tampered with other because cloud provider is not completely trusted. Integrity Verification and time delay consumption can be managed by without TPA by using AES and RC6 algorithm.
Authors and Affiliations
Madava Krishnan, Hari priya, Aruna devi, Dee pthi
Detection of Polycystic Ovary Syndrome from Ultrasound Images Using SIFT Descriptors
Polycystic Ovary Syndrome (PCOS) is a reproductive metabolic complexity described by the quantity of follicles present in the ovary. Ultrasound imaging of the ovary contains basic data about the size, number of follicles...
Block Chain Technology for Privacy Protection for Cloudlet-based Medical Data Sharing
With the popularity of wearable devices, along with the development of clouds and cloudlet technology, there has been increasing need to provide better medical care. The processing block chain of medical data mainly incl...
A Survey on Big Data Security and Related Techniques to Improve Security
Upgrade of security and protection in portable server farms is challengeable with proficient security key administration. For promoting and research, huge numbers of the organizations utilize huge information, however mi...
Hybridization Approach to Classify Big Data Using Social Internet of Things
Recently there has been quite a number of independent research activities that investigated the potentialities of integrating social networking concepts into Internet of Things solutions. The resulting paradigm, named So...
Enhanced Secure Big Data in Distributed Mobile Cloud Computing Using Fuzzy Encryption Model
This paper proposes a novel architecture for adaptive encryption of public cloud databases that offers a proxy-free alternative to the system. cloud system is difficult to synchronize login and authentication data betwee...