A subtree-based transformation model for cryptosystem using chaotic maps under cloud computing environment for fuzzy user data sharing

2020 ◽  
Vol 33 (7) ◽  
pp. e4307 ◽  
Author(s):  
Chandrashekhar Meshram ◽  
Cheng-Chi Lee ◽  
Abhay S. Ranadive ◽  
Chun-Ta Li ◽  
Sarita Gajbhiye Meshram ◽  
...  
2019 ◽  
Vol 23 (24) ◽  
pp. 13127-13138 ◽  
Author(s):  
Chandrashekhar Meshram ◽  
Cheng-Chi Lee ◽  
Sarita Gajbhiye Meshram ◽  
Muhammad Khurram Khan

2021 ◽  
Vol 118 ◽  
pp. 102185
Author(s):  
Bowen Liu ◽  
Shunmei Meng ◽  
Xutong Jiang ◽  
Xiaolong Xu ◽  
Lianyong Qi ◽  
...  

2020 ◽  
Vol 5 (19) ◽  
pp. 26-31
Author(s):  
Md. Farooque ◽  
Kailash Patidar ◽  
Rishi Kushwah ◽  
Gaurav Saxena

In this paper an efficient security mechanism has been adopted for the cloud computing environment. It also provides an extendibility of cloud computing environment with big data and Internet of Things. AES-256 and RC6 with two round key generation have been applied for data and application security. Three-way security mechanism has been adopted and implemented. It is user to user (U to U) for data sharing and inter cloud communication. Then user to cloud (U to C) for data security management for application level hierarchy of cloud. Finally, cloud to user (C to U) for the cloud data protection. The security analysis has been tested with different iterations and rounds and it is found to be satisfactory.


2020 ◽  
Vol 5 (17) ◽  
pp. 6-10
Author(s):  
Md. Farooque ◽  
Kailash Patidar ◽  
Rishi Kushwah ◽  
Gaurav Saxena

This paper explores different security aspects in cloud computing environment. It includes data sharing mechanism, inter cloud communication, data breaches, data control, user-cloud relationship along with the cloud data management with standard security algorithms. It also covers the related reviews and analytical analysis on the traditional approaches for the gap identification. So, a short meta-analysis has been presented based on the method discussed along with the advantages and challenges found. It also explores the future prospective where there is the need of exploration and research.


Author(s):  
. Monika ◽  
Pardeep Kumar ◽  
Sanjay Tyagi

In Cloud computing environment QoS i.e. Quality-of-Service and cost is the key element that to be take care of. As, today in the era of big data, the data must be handled properly while satisfying the request. In such case, while handling request of large data or for scientific applications request, flow of information must be sustained. In this paper, a brief introduction of workflow scheduling is given and also a detailed survey of various scheduling algorithms is performed using various parameter.


Sign in / Sign up

Export Citation Format

Share Document