Cloud Computing Security With Two-Level Mechanism
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 1
Abstract
The recent success of cloud services and its ever increasing popularity are not unknown to anyone and neither are the security threats which persist in parallel with its growth. Countermeasures have been introduced to minimize the threats; still the security breaches are always at large. It has been observed from the previous studies that emphasis has been given largely on security of Cloud services; still solutions are far from expected. We present a solution which can be used to generate higher level of security to the Clients as well as an encryption technique to further improvise the existing structure of Cloud Computing.
Authors and Affiliations
H. V. Taiwade
Automatic Grinding Control using Adaptive Minimum Variance Control Theory with Temperature Fuzzy Controlling
The paper displays the inference of a new multivariable adaptive controller, which minimizes an expense function, incorporating input framework, yielding more set points. It gives an adaptive system which ensures mi...
Target Tracking Problem in Mobile Sensor Networks
Target Tracking became a challenging task for the researchers in sensor networks, where it dictates the accuracy of a targets position and is measured. This paper discussed the target tracking problem in a mobile sen...
Intelligent Database System-Ontology for a Better Database System
With monumental stress on the huge databases of ever increasing data available not only with the standalone systems but with the networks and internet all loaded with Everest size mountains of huge terabytes of infor...
Content-based image retrieval using DWT based feature extraction and texture, shape and color features
Content Based Image Retrieval (CBIR) is the retrieval of images based on visual features such as colour, texture and shape. In this paper, we propose the algorithm on the basis of extraction and matching of color and...
Effective Mining Scheme for Large Streams Personalized Data Using Sparse Data
Reference methods are extremely significant in the fields of E-commerce and other Web-based services. One of the major complexities is dynamically providing high-quality suggestion on sparse data. In this paper a wor...