RSA Algorithm achievement with Federal information processing Signature for Data protection in Cloud Computing
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2012, Vol 3, Issue 1
Abstract
Cloud computing presents IT organizations with a fundaÂmentally different model of operation, one that takes advantage of the maturity of web applications and networks and the rising interoperability of computing systems to provide IT services. Data security is becoming a core problem in cloud computing, there are some kind of solution that are provide some security with model, some technology. In this paper is attempt to secure data from unauthorized access, the Method of data security is RSA algorithm for providing data security by encrypting the given data based on the KEY combinations. And this data then can only be decrypted by authorized person by using his private key. For the same purpose Google application cloud has been implemented on IJCT Foundation, all data has of IJCT Foundation sifted to Google cloud and RSA security algorithm is implemented by us for secure data.
Authors and Affiliations
Abhishek Patial, Sunny Behal
Secure Data Forwarding in Cloud Storage System by using UMIB Proxy
The cloud storage system is a model consists of networked online collection of storage servers that provides long-term storage services over the Internet hosted by the third parties. Storing data in third party’s cloud...
Feature-based Similarity Method for Aligning the Malay and English News Document
Corpus-based translation approach can be used to obtain reliable translation knowledge in addition to the use of dictionaries or machine translation. But the availability of such corpus is very limited especially for the...
A Biochemical Study to Estimate Malonaldehyde and Ceruloplasmin Oxidase Activity As Parameters Express Oxidation – Antioxidation Balance for Patients With Acute Hepatitis Virus Type C
Oxygen free radicals play an important role in the pathogenesis of tissue damage in many pathological conditions, including liver diseases. Aim of the present study focused on the investigation the possible relationship...
To investigate the Temporal and Spatial correlation behavioral characteristics of MIMO fading channels
This paper deals with the analysis of performance bounds of narrowband multiple-input multiple-output (MIMO) fading channels considering the transmission links from the mobile station (MS) to the base station (BS) throug...
An Executive Approach to Achieve Mutual Exclusion in Distributed Data using Topology and Association Rule.
In this paper, a new approach is being proposed to achieve mutual exclusion in distributed system using computer network and topology of nth nodes. In this executive approach nodes communicate among themselves using me...