Review on Advanced Encryption Standard Algorithm in Cloud Computing
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 11
Abstract
Cloud computing is a progressive figuring worldview, which engages adaptable, on-request, and minimal effort utilization of registering assets . Cloud computing is developing quick with time .But the information is outsourced to some cloud servers, and different security concerns rise up out of it. Thusly, Security is a fundamental segment in cloud computing for ensuring clients data is determined to the secured mode in the cloud .The development of the cloud clients has lamentably been went with a development in pernicious movement in the cloud. Security is a tidy worry in the utilization of cloud computing. In this paper we have reviewed an outline of security issues besides analyse the common sense of applying encryption calculations for data security and insurance in disseminated storage.
Authors and Affiliations
Rishith Polepally, T. Shanthan Reddy, Priya G
Domain Based Categorization Using Adaptive Preprocessing
As the number users accessing network for various purposes increases and simultaneously size of the Network and Internet traffic increase so, there is need for categorization web pages according to domain for easy acces...
Adiponectin Gene Polymorphism SNP +45 T/G in Type 2 Diabetic Patients in Assam, India
Background: Adiponectin SNPs gene have been associated with BMI, insulin sensitivity and type 2 diabetes, reportedly. In this Case study we investigate Adiponectin SNP gene +45*T/G (rs2242766) in type 2 diabetes and Hea...
A Study on the Impact of Values on Career Decision Making of Adolescents
Identifying ones personal values is an important part of a successful career plan. Adolescence is a time, filled with countless opportunities and challenges which involves taking decisions that will shape their future....
Analysis of Reversible Data Hiding Efficiency of Images in Image Processing
Now a day data hiding has more attention in image processing field. Reversible data hiding has considerably new approach in image processing. Which allow original image to be completely recovered from marked image effic...
Various Attacks Including JellyFish Attack Along With Security Issues In Manet
The MANET which is termed as Mobile Adhoc network works like a wireless network with unrestricted mobility and without any infrastructure. To design a new security mechanism for MANET various attack variations as well a...