Verification of Metadata by Encryption for Data Storage Security in Cloud
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2012, Vol 1, Issue 6
Abstract
Cloud Computing provides the way to share distributed resources and services that belong to different organizations or sites. Since Cloud Computing share distributed resources via network in the open environment thus it makes security problems. All types of users who require the secure transmission or storage of data in any kind of media or network. Since the data transmission on the internet or over any networks are vulnerable to the hackers attack. We are in great need of encrypting the data. I propose a method to build a trusted computing environment for Cloud Computing system by providing Secure cross platform in to Cloud Computing system. In this method some important security services including authentication, encryption and decryption and compression are provided in Cloud Computing system. The need for this software can be categorized in two categories: Encryption and Decryption, Compression.
Authors and Affiliations
Bhupesh Kumar Dewangan, Sanjay Kumar Baghel
Survey Paper on Music Beat Tracking
Tempo in music is beats perceived by us in unit time. The tempo is measured as number of beats per minute (BPM) in a music clip. This paper includes two algorithms used to measure tempo of music file. First one is an...
Multi Biometric Model for Authentication Method
In recent years, biometric authentication has seen considerable improvements in reliability and accuracy,with some biometrics contribute reasonably good overall performance. In biometric based systems for identity ve...
Anti Phishing approach using Visual Cryptography and Iris Recognition
Phishing is a form of online identity theft. Phishing webpages are forged webpages created by malicious people that aim to steal sensitive information such as online banking passwords and credit card informations. Th...
Mobile Positioning Techniques in GSM Cellular Networks based on Signal Strength
Locating the site of a mobile user with a high degree of correctness is a research interest that holds the key to a get through in many service challenges faced by operators in the wireless communication world. The b...
A Hybrid Approach to Detect and Recognize Texts in Images
Text data present in images serves important information which is helpful for different applications. Locating text in case of variation in style, color, as well as complex image background makes text reading from imag...