A Survey on Classification Methodologies of Encryption Methods in Cloud
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 3
Abstract
Cloud computing is a model for emerging convenient, on-demand access to shared pool of configurable computing resources. Cloud computing is modify the way of organizations manage their data. Privacy is main issues for storing and retrieving the data. To prevent data from unauthorized data by using various methods such as access control, attribute based encryption method, trusted third party, audit ability these methods are enabling to provide user for integrity and confidentiality. Here this paper explains the various issues related to privacy for user’s data on cloud server to propose third party authentication system. To propose an access control scheme for secure data storage in cloud server. It support anonymous authentication. The task of allowing third party auditor to verify the integrity of the dynamic data stored in the cloud.
Authors and Affiliations
G. Priyanga, S. Benila
Prototype Development of a SmartphoneControlled Robotic Vehicle with Pick- Place Capability
The work in this paper is directed towards the development of a robotic vehicle with arm and gripper, whose movements can be controlled by giving commands through android based Smartphone over Bluetooth wireless protoco...
slugAutomatic Message Sender—An Application For Android
Android is an operating system for smart phones developed by Google Inc and the Open Handset Alliance (OHA).This era is surrounded by technology. The smart phones has so much of capabilities. This paper deals with the...
Brain Tumor Detection in MRI using Segmentation and Classification Technique
The large data set demands a highly productive segmentation and classification system. This system shows brain tumor classification in the form of different classes. This system depends on segmentation scheme. The segme...
Multi-Tier Authentication with DIFFIE-HELLMAN Key Exchange Using HMAC and AES Algorithm to Enhance Security in Cloud Computing
Security and privacy in cloud computing is one of the most challenging ongoing research areas because data owner stores their sensitive data to remote servers which is not controlled and managed by data owners. Since cl...
DigSILENT Modeling of Power Electronic Converters for Distributed Generation systems
In this paper with increasing levels of small-scale distributed generation (DG) systems connecting into the electrical grid, there is a growing awareness of potentially adverse interactions between these systems and the...