A Bitmap based Data Encryption Scheme in Cloud Computing

Author(s):  
Min Yoon ◽  
Miyoung Jang ◽  
Young-Sung Shin ◽  
Jae-Woo Chang
2015 ◽  
Vol 9 (5) ◽  
pp. 345-360 ◽  
Author(s):  
Min Yoon ◽  
Miyoung Jang ◽  
Young-Sung Shin ◽  
Jae-Woo Chang

2018 ◽  
Vol 5 (2) ◽  
pp. 1 ◽  
Author(s):  
SHAFI'I MUHAMMAD ABDULHAMID ◽  
NAFISAT ABUBAKAR SADIQ ◽  
ABDULLAHI MOHAMMED ◽  
NADIM RANA ◽  
HARUNA CHIROMA ◽  
...  

2018 ◽  
Vol 7 (2.21) ◽  
pp. 355
Author(s):  
P Sheela Gowr ◽  
N Kumar

Cloud computing was a hasting expertise which has innovated to a collection of new explores. A sub-ordinate device for Information services, it has an ability towards encourage development by feeding convenient environments for a choice of forms of development is different sequence. Clouds usually consider being eco-friendly, however keep it has open to the diversity of some security issues to can change together the feeder as well as users of these cloud services. In this issue are principally associated to the protection of the information flow throughout also being store in the cloud, with simple problems along with data ease of use, data right to use and data confidentiality. Data encryption and service authentication scheme has been initiated by the industries to deal with them. In this paper analyse and examine different issues on security beside with the different procedure worn by the industries to solve these effects. 


Author(s):  
Kimaya Arun Ambekar ◽  
Kamatchi R.

Cloud computing is based on years of research on various computing paradigms. It provides elasticity, which is useful in the situations of uneven ICT resources demands. As the world is moving towards digitalization, the education sector is expected to meet the pace. Acquiring and maintaining the ICT resources also necessitates a huge amount of cost. Education sector as a community can use cloud services on various levels. Though the cloud is very successfully running technology, it also shows some flaws in the area of security, privacy and trust. The research demonstrates a model in which major security areas are covered like authorization, authentication, identity management, access control, privacy, data encryption, and network security. The total idea revolves around the community cloud as university at the center and other associated colleges accessing the resources. This study uses OpenStack environment to create a complete cloud environment. The validation of the model is performed using some cases and some tools.


Sign in / Sign up

Export Citation Format

Share Document