ENERGY CONSERVATION IN CLOUD ENVIRONMENTS USING ALTERNATIVE EMAIL-ID APPROACH
Journal Title: International Journal on Computer Science and Engineering - Year 2014, Vol 6, Issue 5
Abstract
(100%)Cloud computing is a new Model for deliver and accessing the services over the Internet. So cloud provider responsibility to verify the user or client is Authorized or not.For this purpose cloud provider shall provide some Authencatation mechanism and satisfying that cloud provider concludes that the client is Authorized. During the verification of authorizatation mechanism,In . Traditional way cloud provider uses the password and Biometric authentication mechanism. During this process Cloud provider shall maintain the large database for storing the biometric parameters like finger print ,images etc..and need a Computational resources to verifying that. Here it’s the problem for wastage the resources. To Eliminate the for maintaining the Large database and computational resources we proposed a technique called Alternative E-Mail- ID+UniqueIdentatification Number (UIN)+Person identity information approach for Authentication purpose for cloud providers.
Authors and Affiliations
B. KrishnaPrasad , Dr. K. Tirupathirao , G. C. N. Mahesh
Public Key Cryptosystem based on Pell’s Equation Using The Gnu Mp Library
Protection of data is the utmost thing for any company related to digital information. There are several malicious methods adapted, based on the priority of demand of that piece of information. There are several cryptosy...
Cluster level optimization of residual energy consumption in wireless sensor networks for lifetime enhancement
Network lifetime is perhaps the most important metric for the evaluation of sensor networks. In a resource-constrained environment, the consumption of every limited resource must be considered The network can only fulfil...
A Comparative study of Forward Secure Publickey Method Using HIBE and BTE
T h e threat of key exposure becoming more acute as yptographic computations are performed more frequently on poorly protected devices (smart-cards, mobile phones, even PCs), new techniques are needed to deal with this...
ICS: An Interactive Control System for Simulating the Probability of Car Accidents with Object Oriented Paradigm and Cellular Automaton
As the number of vehicles continues to grow, more accidents occur most likely due to careless driving of the drivers who do not maintain the safety distance. To assist managers in their tasks of traffic planning, a syste...
An Analysis of Particle Swarm Optimization with Data Clustering-Technique for Optimization in Data Mining
Data clustering is a popular approach for automatically finding classes, concepts, or groups of patterns. Clustering aims at representing large datasets by a fewer number of prototypes or clusters. It brings simplicity i...