Secured Architecture To Access Cloud Based Services
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 12
Abstract
Cloud computing is new software IT revolution refers to the delivery of computer resources over the internet. Cloud storage is about much more than hosting online media. You need to deliver online media content, such as streaming video, fast enough for your web viewing audience. But sometimes user determine the selection cloud services may have loss of confidentiality and data emission this paper aims to provide maximal safeness and confidentiality to the data placed on the cloud by using two way validation process and Tresorit-The ultimate way to stay safe in the cloud with the use of factors to the internet browsers. The main advantage of this application is to provide maximum security and maintenance free service. The uniqueness of this process is to keep the data on different clouds which produces a thereat free application to end user.
Authors and Affiliations
Ch V. V Ganeswara Rao, Chokkapu Narayanarao
Data Stream Mining using Reinforcement Learning: A Survey
Large numbers of real world applications are producing continuous and large data streams for further analysis. Data stream mining is allowing users to extracts knowledge in the form of patterns or model from the cont...
Data Accelerating In Wireless Sensor Networks Without Prune Delay
In this advance and fast world people do no want to wait much for collecting information.Hence now a days collecting information in a faster way became a challenge for the research. Faster data collection in WSN with...
Efficient Techniques For load balancing and dynamic resource management in cloud
Cloud computing applications are developed using MapReduce programming. Cloud computing distributed file system nodes perform functionality like computing as well as storage in this a file is partitioned into a numbe...
A Reliable Image Steganography with Image Clustering and Robust Steganography using IWT
Steganography is the science that includes imparting mystery information in a suitable sight and multimedia bearer, e.g., picture, sound, and video records. In this paper, we propose a changed secure steganography pla...
Secret Sharing of Convergent Keys to Third Party Concept of Dekey
Data de-duplication is a method for eliminating redundant data copies and has been widely used in cloud storage provider to reduce the storage space and bandwidth. The arising challenge is to perform secure de-duplic...