Showing 265–276 of 860 results

  • DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party

    DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party

    0 out of 5
    4,500

    DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party Abstract– Off-site data storage is an application of cloud that relieves the customers from focusing on data storage system. However, outsourcing data to a third-party administrative control entails serious security concerns. Data leakage may occur due to attacks by other users and machines in the…

  • DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party

    DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party

    0 out of 5
    4,500

    DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party Abstract?Off-site data storage is an application of cloud that relieves the customers from focusing on data storage system. However, outsourcing data to a third-party administrative control entails serious security concerns. Data leakage may occur due to attacks by other users and machines in the cloud….

  • Data Analysis for Chronic disease ?Diabetes using  Map Reduce Technique

    Data Analysis for Chronic disease ?Diabetes using Map Reduce Technique

    0 out of 5
    5,500

    Data Analysis for Chronic disease ?Diabetes using Map Reduce Technique Abstract? Chronic disease endured for a long period of time.They are only be controlled but cannot be cured completely. Most of the people in the world are affected by chronic disease. In foreign countries like U.S. most of the death happens due to chronic disease….

  • Data as a Currency and Cloud-Based Data Lockers

    Data as a Currency and Cloud-Based Data Lockers

    0 out of 5
    4,500

    Data as a Currency and Cloud-Based Data Lockers Abstract? Monetization strategies that are apparent to consumers include virtual goods, in-app purchases, and advertising-supported models, as the increasing number of pop-ups, pop-unders, banners, mobile, text-based, in-game, and other ad types makes clear. Such ads can be used not only to sell products and services directly, but…

  • Data Recovery

    Data Recovery

    0 out of 5
    5,500

    Data Recovery Abstract-The data recovery process is the one of the important process in the computer field. It is more important to recover the files which are deleted without knowledge. In our process the user want to first enroll and login into the system for the secure usage of the system. After that the user…

  • Data Sharing Framework in Cloud-Assisted Internet of Everything

    Data Sharing Framework in Cloud-Assisted Internet of Everything

    0 out of 5
    4,500

    Fair and Dynamic Data Sharing Framework in Cloud-Assisted Internet of Everything Abstract-Cloud-assisted Internet of Things (IoT) is increasingly prevalent in our society, for example in home and office environment; hence, it is also known as Cloud-assisted Internet of Everything (IoE). While in such a setup, data can be easily shared and disseminated (e.g., between a…

  • Data Transfer Scheduling for Maximizing Throughput of Big-Data Computing in Cloud Systems

    Data Transfer Scheduling for Maximizing Throughput of Big-Data Computing in Cloud Systems

    0 out of 5
    4,500

    Data Transfer Scheduling for Maximizing Throughput of Big-Data Computing in Cloud Systems Abstract?Data Transfer Scheduling for Maximizing Throughput of Big-Data Computing in Cloud Systems. Many big-data computing applications have been deployed in cloud platforms. These applications normally demand concurrent data transfers among computing nodes for parallel processing. It is important to find the best transfer…

  • Data Transmission using Audio Steganography

    Data Transmission using Audio Steganography

    0 out of 5
    4,500

    Data Transmission using Audio Steganography Abstract? Data transmission in public communication system is not secure because of interception and improper manipulation by eavesdropper. So the attractive solution for this problem is Steganography, which is the art and science of writing hidden messages in such a way that no one, apart from the sender and intend…

  • Data-driven and Feedback-Enhanced Trust Computing Pattern for Large-scale Multi-Cloud Collaborative Services

    Data-driven and Feedback-Enhanced Trust Computing Pattern for Large-scale Multi-Cloud Collaborative Services

    0 out of 5
    4,500

    Data-driven and Feedback-Enhanced Trust Computing Pattern for Large-scale Multi-Cloud Collaborative Services Abstract? Data-driven and Feedback-Enhanced Trust Computing Pattern for Large-scale Multi-Cloud Collaborative Services. Multi-cloud collaborative environment consists of multiple data centers, which is a typical processing platform for big data. This paper focuses on the trust computing requirement of multi-cloud collaborative services and develops a…

  • Decentralized Access control with Anonymous Authentication of Data Store in clouds

    Decentralized Access control with Anonymous Authentication of Data Store in clouds

    0 out of 5
    4,500

    Decentralized Access control with Anonymous Authentication of Data Store in clouds. Decentralized storage system for accessing data with anonymous authentication provides more secure user authentication, user revocation and prevents replay attacks. Access control is processed on decentralized KDCs it is being more secure for data encryption. Generated decentralized KDC’s are then grouped by (KGC). Our…

  • Deduplication on Encrypted Big Data in Cloud

    Deduplication on Encrypted Big Data in Cloud

    0 out of 5
    5,500

    Deduplication on Encrypted Big Data in Cloud Abstract?Cloud computing offers a new way of service provision by re-arranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data…

  • Defeat Low-rate DDoS Attack in Container-based Cloud Environment

    Defeat Low-rate DDoS Attack in Container-based Cloud Environment

    0 out of 5
    4,500

    Exploring New Opportunities to Defeat Low-rate DDoS Attack in Container-based Cloud Environment Abstract-DDoS attacks are rampant in cloud environments and continually evolve into more sophisticated and intelligent modalities, such as low-rate DDoS attacks. But meanwhile, the cloud environment is also developing in constant. Now container technology and microservice architecture are widely applied in cloud environment…

End of content

End of content