Neural Networks and Rules-based Systems used to Find Rational and Scientific Correlations between being Here and Now with Afterlife Conditions
Neural Networks and Rules-based Systems used to Find Rational and
Article Fingerprint
ReserarchID
CSTB4U4OO
Cloud computing is the re-incarnation of the client-server architecture. It is highly promising technology because of its unlimited resource provisioning and data storage services which help us in managing the data as per requirements. Due to the use of internet and vital remote servers to maintain the data and applications, the cloud computing environment becomes open for the attackers to attack on the user data and communication services. This paper mainly focuses on the user authentication and data security over the Broker Cloud Computing Paradigm by purposing new cryptographic technique named as Multi Round Selective Encryption using AES. Along with this, we compared our approach with existing cryptographic techniques as AES, Blowfish and Selective encryption to find out its pros and cons. The Multi Round Selective Encryption with AES is the best suitable technique where the file size is large because it gives fast execution by maintaining the encryption complexity as compared to selective encryption technique in public and hybrid cloud.
Amanpreet Kaur. 2013. \u201cMulti Round Selective Encryption using AES over Storage Cloud\u201d. Global Journal of Computer Science and Technology - B: Cloud & Distributed GJCST-B Volume 13 (GJCST Volume 13 Issue B3): .
Crossref Journal DOI 10.17406/gjcst
Print ISSN 0975-4350
e-ISSN 0975-4172
The methods for personal identification and authentication are no exception.
The methods for personal identification and authentication are no exception.
Total Score: 108
Country: India
Subject: Global Journal of Computer Science and Technology - B: Cloud & Distributed
Authors: Amanpreet Kaur, Gaurav Raj, Dr. Dheerendra Singh (PhD/Dr. count: 1)
View Count (all-time): 276
Total Views (Real + Logic): 9645
Total Downloads (simulated): 2506
Publish Date: 2013 08, Fri
Monthly Totals (Real + Logic):
Neural Networks and Rules-based Systems used to Find Rational and
A Comparative Study of the Effeect of Promotion on Employee
The Problem Managing Bicycling Mobility in Latin American Cities: Ciclovias
Impact of Capillarity-Induced Rising Damp on the Energy Performance of
Cloud computing is the re-incarnation of the client-server architecture. It is highly promising technology because of its unlimited resource provisioning and data storage services which help us in managing the data as per requirements. Due to the use of internet and vital remote servers to maintain the data and applications, the cloud computing environment becomes open for the attackers to attack on the user data and communication services. This paper mainly focuses on the user authentication and data security over the Broker Cloud Computing Paradigm by purposing new cryptographic technique named as Multi Round Selective Encryption using AES. Along with this, we compared our approach with existing cryptographic techniques as AES, Blowfish and Selective encryption to find out its pros and cons. The Multi Round Selective Encryption with AES is the best suitable technique where the file size is large because it gives fast execution by maintaining the encryption complexity as compared to selective encryption technique in public and hybrid cloud.
We are currently updating this article page for a better experience.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.