Data Confidentiality and Security in Cloud Computing Using KIST Algorithm
Journal Title: International journal of Emerging Trends in Science and Technology - Year 2016, Vol 3, Issue 5
Abstract
Now days quickly expanded utilization of cloud computing in the numerous association and IT commercial industries and furnishes latest software solution with cost effective. So the cloud computing give us numerous of advantages with minimum cost and of information openness through Internet. The guaranteeing security risk of the cloud computing is the part in the distributed computing environment, the advancing, the evolving quintessence is cloud computing, that is gainful in cost effective parts, such as, ability inflexible computing, down the time period to advertise and in adequate computing power. By utilizing the complete capacity of cloud computing, information are transmitted, prepared and put away on the outside cloud administration suppliers. The truth of the matter is that, the proprietor of the information is feeling to a great degree unconfident to find their information external to their own particular control. Security and Secrecy of information put away in the cloud are key setbacks in the range of of Cloud computing. Security and Secrecy are the key problem for cloud storage. This paper proposes a KIST encryption calculation to focus on the security and Secrecy problem in cloud storage furthermore packed figure content information to ensure the information put away in the cloud
Authors and Affiliations
Adesh V. Bhabad
Genome Editing: An advanced tool for targeted mutation in living Organisms
The living organisms can be genetically altered through Hybridization, Mutation and Genetic engineering to meet desired needs. However, these processes are more random and depends on chance factor compared to targeted en...
Fast and Approximate Processing Unit for 2D Discrete Cosine System
The recent time witnesses a tremendous need for high performance digital signal Processing (DSP) systems for high end emerging applications like HD-TV, medical imaging, satellite communication, 3G mobile technologies etc...
Content Addressable Memory with Efficient Power Consumption and Throughput
Content-addressable memory (CAM) is a hardware table that can search and Store data.CAM is actually considerable Power Consumption and parallel comparison feature where a large amount of transistor are active on each loo...
Defect Analysis & Reduction in Rejection on “Governor Support”
Currently the assembly of engine are performed by manually. During assembly of governor support O-ring cut due to improper fitment. In this project we provide additional ring which acts as seal. This seal avoid the leaka...
Pollution of Soil Due To Leather Factory Near Ranipet,Tamil Nadu (India)
Nature mainly consists of air, water and soil. In balancing of any three causes major problems in natural process. Soil provides all the basic needs to us and is the most important medium for growing plants. Soil is one...