Big Data Authentication Using Cloud Storage with Fine Grained Updates
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 6
Abstract
Abstract: Now a days cloud computing is one of the intensively growing technology.Cloud computing is storing and accessingbased program over the internet without use of your computer’s hard drive. Proposed system mainly focuses on security of private confidential data stored on cloud. Now a day’s use of cloud increasing rapidly.In order to manage security of private/confidential data we need an effective system. In proposed work we provide system which continuously interact with the content owner of cloud and gives continuous updates to content owner.Existing system also audits data which result in time consuming process.Instead of checking onwhole data whether the updates are going on or not in system, proposed system divides the whole data in blocks and system checks that particular updated block where changes occurs. Hence proposed systemprovides reliability and enhanced security.
Authors and Affiliations
Manoj Kottawar , Omshankar Swami , Govind Sakhare , Gaurav Shiraskar , Prof. Sachin Patil5
An Efficient Methodology for Clustering Uncertain Data Based on Similarity Measure
Abstract: In data mining clustering is one of the most important and crucial task. There exists various clustering techniques like partitioning and density based techniques. The previous methods worked on traditional par...
A survey of Parallel models for Sequence Alignment using SmithWaterman Algorithm
Abstract: Nowadays stack of biological data growing steeply, so there is need of smart way to handle andprocess these data to extract meaningful information related to biological life. The purpose of this survey is...
Super-Resolution Reconstruction of Images using Total Variation Regularization and Wiener Filter Deconvolution
Abstract: This paper presents a novel technique for reconstruction of High-resolution images from multiple Low-resolution images. A Multi-frame approach implements fusion of non-redundant information which was obtained f...
Non-Intrusive Speech Quality with Different Time Scale
Speech quality evaluation is an extremely important problem in modern communication networks. Service providers always strive to achieve a certain Quality of Service (QoS) in order to ensure customer satisfaction...
Secure Data Sharing Using Cryptography in Cloud Environment
Abstract : Cloud computing is rapidly growing due to the provisioning of elastic, flexible, and on-demand storage and computing services for users. In cloud based storage concept, data owner does not have full control ov...