Journal of emerging technologies and innovative research, Nov 1, 2018
Cloud computing, often referred to as simply "the cloud", is the delivery of on-demand computing ... more Cloud computing, often referred to as simply "the cloud", is the delivery of on-demand computing resourceseverything from applications to data centers-over the internet on a pay-for-use basis. The cloud storage contributors are in charge for monitoring the data which is available and accessible on the cloud. It is a dreadfully challenging part to maintain the security of data stored in third party cloud database. The stored data in cloud is so important that the user ensures that no data is corrupted or lost. Much research work has been done on data security using RSA with a traditional approach and logic. The entitled research work emphasize on a robust scheme to provide integrity, privacy, and confidentiality to data stored on the cloud .The scheme emphasize on security and authentication using efficient RSA with key encryption MD5 along with the efficient mechanism for data being stored in the data centers. RSA algorithm uses efficient two public key pairs rather than sending the encryption value directly as a public key. Work is done on load balancing technique and on other performance parameters like load capacity, PSNR, time and security.
Journal of emerging technologies and innovative research, 2018
Cloud computing, often referred to as simply “the cloud”, is the delivery of on-demand computing ... more Cloud computing, often referred to as simply “the cloud”, is the delivery of on-demand computing resources everything from applications to data centers-over the internet on a pay-for-use basis. The cloud storage contributors are in charge for monitoring the data which is available and accessible on the cloud. It is a dreadfully challenging part to maintain the security of data stored in third party cloud database. The stored data in cloud is so important that the user ensures that no data is corrupted or lost. Much research work has been done on data security using RSA with a traditional approach and logic. The entitled research work emphasize on a robust scheme to provide integrity, privacy, and confidentiality to data stored on the cloud .The scheme emphasize on security and authentication using efficient RSA with key encryption MD5 along with the efficient mechanism for data being stored in the data centers . RSA algorithm uses efficient two public key pairs rather than sending t...
Zenodo (CERN European Organization for Nuclear Research), May 3, 2023
Trademarked names, logos, and images may appear in this book. Rather than use a trademark symbol ... more Trademarked names, logos, and images may appear in this book. Rather than use a trademark symbol with every occurrence of a trademarked name, logo, or image we use the names, logos, and images only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark. The use in this publication of trade names, trademarks, service marks, and similar terms, even if they are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights.
Journal of emerging technologies and innovative research, Nov 1, 2018
Cloud computing, often referred to as simply "the cloud", is the delivery of on-demand computing ... more Cloud computing, often referred to as simply "the cloud", is the delivery of on-demand computing resourceseverything from applications to data centers-over the internet on a pay-for-use basis. The cloud storage contributors are in charge for monitoring the data which is available and accessible on the cloud. It is a dreadfully challenging part to maintain the security of data stored in third party cloud database. The stored data in cloud is so important that the user ensures that no data is corrupted or lost. Much research work has been done on data security using RSA with a traditional approach and logic. The entitled research work emphasize on a robust scheme to provide integrity, privacy, and confidentiality to data stored on the cloud .The scheme emphasize on security and authentication using efficient RSA with key encryption MD5 along with the efficient mechanism for data being stored in the data centers. RSA algorithm uses efficient two public key pairs rather than sending the encryption value directly as a public key. Work is done on load balancing technique and on other performance parameters like load capacity, PSNR, time and security.
Journal of emerging technologies and innovative research, 2018
Cloud computing, often referred to as simply “the cloud”, is the delivery of on-demand computing ... more Cloud computing, often referred to as simply “the cloud”, is the delivery of on-demand computing resources everything from applications to data centers-over the internet on a pay-for-use basis. The cloud storage contributors are in charge for monitoring the data which is available and accessible on the cloud. It is a dreadfully challenging part to maintain the security of data stored in third party cloud database. The stored data in cloud is so important that the user ensures that no data is corrupted or lost. Much research work has been done on data security using RSA with a traditional approach and logic. The entitled research work emphasize on a robust scheme to provide integrity, privacy, and confidentiality to data stored on the cloud .The scheme emphasize on security and authentication using efficient RSA with key encryption MD5 along with the efficient mechanism for data being stored in the data centers . RSA algorithm uses efficient two public key pairs rather than sending t...
Zenodo (CERN European Organization for Nuclear Research), May 3, 2023
Trademarked names, logos, and images may appear in this book. Rather than use a trademark symbol ... more Trademarked names, logos, and images may appear in this book. Rather than use a trademark symbol with every occurrence of a trademarked name, logo, or image we use the names, logos, and images only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark. The use in this publication of trade names, trademarks, service marks, and similar terms, even if they are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights.
Uploads
Papers by Digant Parmar