Large number of people has being affected due to heart disease and it has become a major problem.... more Large number of people has being affected due to heart disease and it has become a major problem. One of such threat is Cardiovascular Disease (CVD). If it is not treated and detected at an early and proper stage may lead to death. Especially in medical sector there is no such adequate research focus on effective analysis tool to discover and trends in data. Large amount of complex clinical data of patients and other hospital resources are being generated by health care industry nowadays. In male as well as female, it is the first leading cause of death according to world health organisation (WHO). Various heart diseases are caused due to reduction in supply of blood and oxygen. Therefore main objective of our paper is to predict more accurately the percentage of possibility of cardiovascular disease in minimum number of attributes (like blood pressure, cholesterol, type of chest pain, blood sugar, etc). Many data mining techniques are used to analyse this rich collection of data fr...
The evolution of cloud computing over the past few years is potentially one of the major advances... more The evolution of cloud computing over the past few years is potentially one of the major advances in the history of computing. From a user‘s perspective, cloud computing involves performing a task using someone else‘s computers and possibly software. Cloud computing is a model for enabling ubiquitous, convenient, on-demand demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. While the economic case for cloud computing is compelling, the security challenges it poses are equally striking. Cloud provides many advantages for IT organizations, cloud has some issues that must be consider onsider during its deployment. The main concern is security privacy and trust. In this paper we reviewed security privacy & trust issues of cloud computing.
Abstract: Promoting a website in search engine result is a major task for a webmaster and SEO Eng... more Abstract: Promoting a website in search engine result is a major task for a webmaster and SEO Engineer in website development. This become bottleneck for Webmaster or search engine optimization (SEO) engineer to drive visitors to their site by learning technique and algorithm. In this paper, we present a comparative study of various algorithms use by search engine like Page Rank Algorithm, Weighted Page Rank Algorithm, HITS Algorithm, Query Independent Algorithm and proposed an hybrid approach for optimizing the search engine results using artificial intelligence techniques such as document clustering, genetic algorithm and Query Recommendation to provide the user with the most relevant pages to the search query.
In recent years Mobile ad-hoc network (MANET) is one of the most promising fields for research an... more In recent years Mobile ad-hoc network (MANET) is one of the most promising fields for research and development of wireless network. As the popularity of mobile device and wireless networks significantly increased over the past years, wireless ad-hoc networks has now become one of the most vibrant and active field of communication and networks. Due to severe challenges, the special features of MANET bring this technology great opportunistic together. Owe to the vulnerable nature of the mobile ad hoc network, there are numerous security threats that disturb the development of it. We first analyze the main vulnerabilities in the mobile ad hoc. In this paper, we discuss security issues and their current solutions in the mobile ad hoc network. Networks, which have made it much easier to suffer from attacks than the traditional wired network. Then we discuss the security criteria of the mobile ad hoc network and present the main attack types that exist in it. Finally we survey the current...
Instant messaging is popular and relatively new form of social interaction. Instant Messengers (I... more Instant messaging is popular and relatively new form of social interaction. Instant Messengers (IMs) and Social Networking Sites (SNS) may contain harmful and suspicious messages, which are untraced, leading to hindrance for network communication and cyber security. In this paper, we provided an introduction to various frameworks and review the details of different systems developed so far. Here we attempted to analysis various frameworks and classify them based on different factors, which leads to a better understanding on their operation. We also discuss the implementation details of these systems including the tools used by various authors and the metrics used to measure their performance.
As the rapid development of broadband technologies and the advancement of high-speed networks, th... more As the rapid development of broadband technologies and the advancement of high-speed networks, the video streaming applications and service’s popularity over the Internet has increased. The protection of the bit stream from unauthorized use, duplication and distribution is the key concern in video streaming services. Digital Rights Management (DRM) is one of the most popular approaches to prevent undesirable contents distribution to unauthorized users but it have no significant effect on redistribution of contents, decrypted or at the user-side by authorized yet malicious users and content leakage. Also preserving user privacy, conventional systems have addressed this issue by proposed methods based on the observation of streamed traffic throughout the network. These conventional systems maintain high detection accuracy while coping with some of the traffic variation in the network. However, the detection performance considerably degrades due to the significant variation of video le...
Collaborative Filtering (CF) and Deep Learning is one of the most successful recommendation appro... more Collaborative Filtering (CF) and Deep Learning is one of the most successful recommendation approaches to cope with information overload in the real world. However, typical CF methods equally treat every user and item, and cannot distinguish the variation of user’s interests across different domains. This violates the reality that user’s interests always center on some specific domains, and the users having similar tastes on one domain may have totally different tastes on another domain. Different CF techniques can be classified into two classes: memory-based methods and model based methods., we studied a novel Domainsensitive Recommendation (DsRec) algorithm, to make the rating prediction by exploring the useritem subgroup analysis simultaneously.
1,2G.H. Raisoni University Amravati, Maharashtra ------------------------------------------------... more 1,2G.H. Raisoni University Amravati, Maharashtra --------------------------------------------------------------------------***---------------------------------------------------------------------------ABSTRACT: With the wide variety of products and services available on the web, it is difficult for users to choose the product or service that most meets their needs. In order to reduce or even eliminate this difficulty, recommender systems have emerged. A recommender system is used in various fields to recommend items of interest to users. One of the main areas where this concept is currently used is e-commerce that interacts directly with customers by suggesting products of interest with the aim of improving its sales. Motivated by the observation, a novel Domain-sensitive Recommendation (DsRec) algorithm is proposed, to make the rating prediction by exploring the user-item subgroup analysis simultaneously, in which a user-item subgroup is deemed as a domain consisting of a subset of...
Due to tremendous growth in growth of internet over recent years, huge amount of data collected o... more Due to tremendous growth in growth of internet over recent years, huge amount of data collected over the web and search engine users facing problem in search a relevant information by writing few keywords, search engine returns a number of result page and then user have to spend long time to search a relevant information from number of result. In this paper, we propose a hybrid approach for optimizing the search engine results using document clustering, genetic algorithm and Query Recommendation to provide the user with the most relevant pages to the search query. This process starts with query recommendation, based on learning from query logs that predicts user information requirements in which an algorithm has been applied to recommend related queries to a query submitted by user and process of document clustering, genetic algorithm are applied to resultant pages from query recommendation to deliver most relevant result to user at minimum time. Keywords— Document Clustering; Genet...
In the entire globe, higher learning institutions, organizations and governments are completely d... more In the entire globe, higher learning institutions, organizations and governments are completely dependent on the computer networks which plays a important role in their day to day operations. So the necessity for protecting those networked systems has also increased. Intrusion Detection System which is increasingly a key element of system security is used to identify the malicious activities in a computer network or system. There are different approaches being employed in intrusion detection systems, but unfortunately none of each of the technique so far is not entirely ideal. Intrusion Prevention Systems (IPS) evolved after that to resolve ambiguities in passive network monitoring by placing detection systems on the line of attack. The main functions of IPS's are, as explained to identify malicious activity, log information about it, and attempt to block or stop and report that activity. IPS in other words is IDS that are able to give prevention commands to firewalls and access...
Wireless Local Area Network in IEEE802.11 standard is facing more complicated problem related sec... more Wireless Local Area Network in IEEE802.11 standard is facing more complicated problem related security thread, which expose legitimated users to increased risk. Therefore, the security in WLAN network is very challenge in authentication. Extensible Authentication Protocol (EAP) is an authentication framework that is frequently used in wireless networks and Point to Point connections. For authentication purpose EAP used different methods to performed authentication. In this paper, we will explain each existing EAP authentication method, show the flow of every one and restriction. That way we will propose new method of authentication: Lightweight Extensible Authentication Protocol-Public Key “EAP-PK”. This method of authentication combines between the simplicity of deployment and management of password method and robustness of certificated ones. We will check the EAP-PA security properties (like security and authentication) by using the specialized model checker AVISPA, which provides...
international journal of engineering trends and technology, 2014
These days, the development of World Wide Web has surpassed a considerable measure with additiona... more These days, the development of World Wide Web has surpassed a considerable measure with additional desires. Vast measure of content archives, sight and sound records and pictures were accessible in the web and it is even now expanding in its structures. So with a specific end goal to give better administration along upgrading the nature of sites, it has ended up exceptionally critical for the site holder to better comprehend their clients. This is carried out by mining web. Web mining is the requisition of information mining to concentrate learning from web substance, structure, and utilization which is the gathering of web innovations. Enthusiasm toward Web mining has become quickly in its short history, both in the exploration and expert groups. The proposed paper concentrates on a short diagram of web mining procedures alongside its requisition in related territory. KeywordsWeb mining, Web content mining, Web structure mining, and Web usage mining.
To improve distributed and parallel system performance the load balancing techniques are extensiv... more To improve distributed and parallel system performance the load balancing techniques are extensively using that is a process of redistribution of work load among multiple servers in distributed computer systems. In recent research and literature, various approaches, methods and techniques have been proposed to achieve this task. There is an increasing trend towards the use of parallel and distributed systems because of outstanding progress in computer technology and an ever-rising demand for high-speed processing able to support the distributed mode. One of the important instant of any system using parallel computing is the load balancing in which the balance of workload among the system’s entire server is designed. In this proposed algorithm, trying to implement a new load balancing algorithm which has new parameter consideration and basis of that centralized nodes(server) balancing workload when it get overloaded will be implement.
Image restoration is a very important factor in high level image processing which deals with reco... more Image restoration is a very important factor in high level image processing which deals with recovering of an original, cleared sharp image using a various algorithms and techniques. Certain time during image capturing process degradation i.e image degradation occurs. Image restoration is used to get the original sharp image from the corrupted data. This research paper is aim to provide a comparative overview of most useful fast restoration of degraded image .Different types of image deblurring techniques are Wiener Filter, Neural Network Approach, Iterative Richardson-Lucy Algorithm, Laplacian Sharpening Filter described. The strength and weakness of each approach are identified and applications are also described so that the best fast image deblurring technique is comparatively sorted out.
G.H. Raisoni University Amravati, Maharashtra ---------------------------------------------------... more G.H. Raisoni University Amravati, Maharashtra ------------------------------------------------------------------------***----------------------------------------------------------------------ABSTRACT: Recommendation systems play an important role in the field of e-commerce applications since they provide suggestions to each and every customer based on the reviews and ratings given by the customers. E-commerce has shown to be a promising platform for nowadays business. Customers are now provided a wider set of items to choose from and a lot of companies are migrating from shelf-stores to online markets and offering their products on the web. Recommender Systems have been widely used to exhibit the most appropriate items to users given their past consumption preferences. Recommendation systems are achieving great success in e-Commerce applications, during a live interaction with a customer; recommendation system may apply different techniques to solve the problem of making a correct a...
International Journal of Innovative Research in Computer and Communication Engineering, 2015
Sensitive information modified should be firmly done to verify the integrity of cloud information... more Sensitive information modified should be firmly done to verify the integrity of cloud information, to stop it from being disclosed to or modified by unauthorized parties. Many enterprises supply information storage to the cloud mere a member of a company or information owner can merely share information with completely different members or users with confidentiality. The new public key aggregate policies that prove constant-size ciphertext wherever mere ciphertext unit labeled with sets of attributes and private keys unit associated with structures that management that user is able to decrypt. In several words, the key holder can unleash a constantsize aggregate key for versatile preferences of ciphertext set in cloud storage, but the other encrypted files outside the set keep secret to boot to authentication and privacy preservation this theme tries to satisfy all completely different security wants with key management and achieves higher quantifiability once the quantity of access...
Cloud Computing is an emerging technology which provides services on demand from shared pool of c... more Cloud Computing is an emerging technology which provides services on demand from shared pool of computing resources. Cloud computing has at its core services like platform, infrastructure and software as a service. Benefits of cloud storage are easy access, performance, high availability, cost efficiency and many others. So each and every organization is moving its data to the cloud, that means it uses the storage service provided by the cloud provider. So there is a need to protect the data against unauthorized access, modification or denial of services, data loss, data breach etc. Cloud security is must which will break the hindrance the acceptance of the cloud by the organizations. There are a number of security algorithms which may be implemented to the cloud. This paper is a survey of different security issues to cloud and different cryptographic algorithms adoptable to better security for the cloud.
Cloud Computing:Service models,Types,Database and ssues
The evolution of cloud computing over the past few years is potentially one of the major advances... more The evolution of cloud computing over the past few years is potentially one of the major advances in the history of computing. From a user's perspective, cloud computing involves performing a task using someone else's computers and possibly software. Cloud has given a new meaning to distributed, and off-premises computing. Cloud computing is an architectural model that leverages standardization and consolidation to allow effective and safe sharing of pooled resources. cloud computing refers to the use of scalable, real-time ,Internet-based IT services and resources, incorporating beyond SaaS many key technology trends of the 2000s. Although, Cloud offers great benefits, it also introduces a myriad of security threats to the information and data which is now being ported from on-premises to off-premises. This paper discusses the various service models such as IaaS, PaaS, SaaS. Some products offer Internet-based services—such as storage, middleware, collaboration, and database...
The recent growth in pc networks, and a lot of specifically, the planet Wide internet, copyright ... more The recent growth in pc networks, and a lot of specifically, the planet Wide internet, copyright protection of digital audio becomes a lot of and a lot of necessary. Digital audio watermarking has drawn in depth attention for copyright protection of audio information. A digital audio watermarking may be a method of embedding watermarks into audio signal to point out genuineness and possession. Our technique supported the embedding watermark into audio signal and extraction of watermark sequence. We tend to propose a brand new watermarking system victimization separate Fourier remodel (DFT) for audio copyright protection. The watermarks area unit embedded into the best outstanding peak of the magnitude spectrum of every non-overlapping frame. This watermarking system can provides robust lustiness against many styles of attacks like noise addition, cropping, re-sampling, re-quantization, and MP3 compression and achieves similarity values starting from thirteen sound unit to twenty sou...
Large number of people has being affected due to heart disease and it has become a major problem.... more Large number of people has being affected due to heart disease and it has become a major problem. One of such threat is Cardiovascular Disease (CVD). If it is not treated and detected at an early and proper stage may lead to death. Especially in medical sector there is no such adequate research focus on effective analysis tool to discover and trends in data. Large amount of complex clinical data of patients and other hospital resources are being generated by health care industry nowadays. In male as well as female, it is the first leading cause of death according to world health organisation (WHO). Various heart diseases are caused due to reduction in supply of blood and oxygen. Therefore main objective of our paper is to predict more accurately the percentage of possibility of cardiovascular disease in minimum number of attributes (like blood pressure, cholesterol, type of chest pain, blood sugar, etc). Many data mining techniques are used to analyse this rich collection of data fr...
The evolution of cloud computing over the past few years is potentially one of the major advances... more The evolution of cloud computing over the past few years is potentially one of the major advances in the history of computing. From a user‘s perspective, cloud computing involves performing a task using someone else‘s computers and possibly software. Cloud computing is a model for enabling ubiquitous, convenient, on-demand demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. While the economic case for cloud computing is compelling, the security challenges it poses are equally striking. Cloud provides many advantages for IT organizations, cloud has some issues that must be consider onsider during its deployment. The main concern is security privacy and trust. In this paper we reviewed security privacy & trust issues of cloud computing.
Abstract: Promoting a website in search engine result is a major task for a webmaster and SEO Eng... more Abstract: Promoting a website in search engine result is a major task for a webmaster and SEO Engineer in website development. This become bottleneck for Webmaster or search engine optimization (SEO) engineer to drive visitors to their site by learning technique and algorithm. In this paper, we present a comparative study of various algorithms use by search engine like Page Rank Algorithm, Weighted Page Rank Algorithm, HITS Algorithm, Query Independent Algorithm and proposed an hybrid approach for optimizing the search engine results using artificial intelligence techniques such as document clustering, genetic algorithm and Query Recommendation to provide the user with the most relevant pages to the search query.
In recent years Mobile ad-hoc network (MANET) is one of the most promising fields for research an... more In recent years Mobile ad-hoc network (MANET) is one of the most promising fields for research and development of wireless network. As the popularity of mobile device and wireless networks significantly increased over the past years, wireless ad-hoc networks has now become one of the most vibrant and active field of communication and networks. Due to severe challenges, the special features of MANET bring this technology great opportunistic together. Owe to the vulnerable nature of the mobile ad hoc network, there are numerous security threats that disturb the development of it. We first analyze the main vulnerabilities in the mobile ad hoc. In this paper, we discuss security issues and their current solutions in the mobile ad hoc network. Networks, which have made it much easier to suffer from attacks than the traditional wired network. Then we discuss the security criteria of the mobile ad hoc network and present the main attack types that exist in it. Finally we survey the current...
Instant messaging is popular and relatively new form of social interaction. Instant Messengers (I... more Instant messaging is popular and relatively new form of social interaction. Instant Messengers (IMs) and Social Networking Sites (SNS) may contain harmful and suspicious messages, which are untraced, leading to hindrance for network communication and cyber security. In this paper, we provided an introduction to various frameworks and review the details of different systems developed so far. Here we attempted to analysis various frameworks and classify them based on different factors, which leads to a better understanding on their operation. We also discuss the implementation details of these systems including the tools used by various authors and the metrics used to measure their performance.
As the rapid development of broadband technologies and the advancement of high-speed networks, th... more As the rapid development of broadband technologies and the advancement of high-speed networks, the video streaming applications and service’s popularity over the Internet has increased. The protection of the bit stream from unauthorized use, duplication and distribution is the key concern in video streaming services. Digital Rights Management (DRM) is one of the most popular approaches to prevent undesirable contents distribution to unauthorized users but it have no significant effect on redistribution of contents, decrypted or at the user-side by authorized yet malicious users and content leakage. Also preserving user privacy, conventional systems have addressed this issue by proposed methods based on the observation of streamed traffic throughout the network. These conventional systems maintain high detection accuracy while coping with some of the traffic variation in the network. However, the detection performance considerably degrades due to the significant variation of video le...
Collaborative Filtering (CF) and Deep Learning is one of the most successful recommendation appro... more Collaborative Filtering (CF) and Deep Learning is one of the most successful recommendation approaches to cope with information overload in the real world. However, typical CF methods equally treat every user and item, and cannot distinguish the variation of user’s interests across different domains. This violates the reality that user’s interests always center on some specific domains, and the users having similar tastes on one domain may have totally different tastes on another domain. Different CF techniques can be classified into two classes: memory-based methods and model based methods., we studied a novel Domainsensitive Recommendation (DsRec) algorithm, to make the rating prediction by exploring the useritem subgroup analysis simultaneously.
1,2G.H. Raisoni University Amravati, Maharashtra ------------------------------------------------... more 1,2G.H. Raisoni University Amravati, Maharashtra --------------------------------------------------------------------------***---------------------------------------------------------------------------ABSTRACT: With the wide variety of products and services available on the web, it is difficult for users to choose the product or service that most meets their needs. In order to reduce or even eliminate this difficulty, recommender systems have emerged. A recommender system is used in various fields to recommend items of interest to users. One of the main areas where this concept is currently used is e-commerce that interacts directly with customers by suggesting products of interest with the aim of improving its sales. Motivated by the observation, a novel Domain-sensitive Recommendation (DsRec) algorithm is proposed, to make the rating prediction by exploring the user-item subgroup analysis simultaneously, in which a user-item subgroup is deemed as a domain consisting of a subset of...
Due to tremendous growth in growth of internet over recent years, huge amount of data collected o... more Due to tremendous growth in growth of internet over recent years, huge amount of data collected over the web and search engine users facing problem in search a relevant information by writing few keywords, search engine returns a number of result page and then user have to spend long time to search a relevant information from number of result. In this paper, we propose a hybrid approach for optimizing the search engine results using document clustering, genetic algorithm and Query Recommendation to provide the user with the most relevant pages to the search query. This process starts with query recommendation, based on learning from query logs that predicts user information requirements in which an algorithm has been applied to recommend related queries to a query submitted by user and process of document clustering, genetic algorithm are applied to resultant pages from query recommendation to deliver most relevant result to user at minimum time. Keywords— Document Clustering; Genet...
In the entire globe, higher learning institutions, organizations and governments are completely d... more In the entire globe, higher learning institutions, organizations and governments are completely dependent on the computer networks which plays a important role in their day to day operations. So the necessity for protecting those networked systems has also increased. Intrusion Detection System which is increasingly a key element of system security is used to identify the malicious activities in a computer network or system. There are different approaches being employed in intrusion detection systems, but unfortunately none of each of the technique so far is not entirely ideal. Intrusion Prevention Systems (IPS) evolved after that to resolve ambiguities in passive network monitoring by placing detection systems on the line of attack. The main functions of IPS's are, as explained to identify malicious activity, log information about it, and attempt to block or stop and report that activity. IPS in other words is IDS that are able to give prevention commands to firewalls and access...
Wireless Local Area Network in IEEE802.11 standard is facing more complicated problem related sec... more Wireless Local Area Network in IEEE802.11 standard is facing more complicated problem related security thread, which expose legitimated users to increased risk. Therefore, the security in WLAN network is very challenge in authentication. Extensible Authentication Protocol (EAP) is an authentication framework that is frequently used in wireless networks and Point to Point connections. For authentication purpose EAP used different methods to performed authentication. In this paper, we will explain each existing EAP authentication method, show the flow of every one and restriction. That way we will propose new method of authentication: Lightweight Extensible Authentication Protocol-Public Key “EAP-PK”. This method of authentication combines between the simplicity of deployment and management of password method and robustness of certificated ones. We will check the EAP-PA security properties (like security and authentication) by using the specialized model checker AVISPA, which provides...
international journal of engineering trends and technology, 2014
These days, the development of World Wide Web has surpassed a considerable measure with additiona... more These days, the development of World Wide Web has surpassed a considerable measure with additional desires. Vast measure of content archives, sight and sound records and pictures were accessible in the web and it is even now expanding in its structures. So with a specific end goal to give better administration along upgrading the nature of sites, it has ended up exceptionally critical for the site holder to better comprehend their clients. This is carried out by mining web. Web mining is the requisition of information mining to concentrate learning from web substance, structure, and utilization which is the gathering of web innovations. Enthusiasm toward Web mining has become quickly in its short history, both in the exploration and expert groups. The proposed paper concentrates on a short diagram of web mining procedures alongside its requisition in related territory. KeywordsWeb mining, Web content mining, Web structure mining, and Web usage mining.
To improve distributed and parallel system performance the load balancing techniques are extensiv... more To improve distributed and parallel system performance the load balancing techniques are extensively using that is a process of redistribution of work load among multiple servers in distributed computer systems. In recent research and literature, various approaches, methods and techniques have been proposed to achieve this task. There is an increasing trend towards the use of parallel and distributed systems because of outstanding progress in computer technology and an ever-rising demand for high-speed processing able to support the distributed mode. One of the important instant of any system using parallel computing is the load balancing in which the balance of workload among the system’s entire server is designed. In this proposed algorithm, trying to implement a new load balancing algorithm which has new parameter consideration and basis of that centralized nodes(server) balancing workload when it get overloaded will be implement.
Image restoration is a very important factor in high level image processing which deals with reco... more Image restoration is a very important factor in high level image processing which deals with recovering of an original, cleared sharp image using a various algorithms and techniques. Certain time during image capturing process degradation i.e image degradation occurs. Image restoration is used to get the original sharp image from the corrupted data. This research paper is aim to provide a comparative overview of most useful fast restoration of degraded image .Different types of image deblurring techniques are Wiener Filter, Neural Network Approach, Iterative Richardson-Lucy Algorithm, Laplacian Sharpening Filter described. The strength and weakness of each approach are identified and applications are also described so that the best fast image deblurring technique is comparatively sorted out.
G.H. Raisoni University Amravati, Maharashtra ---------------------------------------------------... more G.H. Raisoni University Amravati, Maharashtra ------------------------------------------------------------------------***----------------------------------------------------------------------ABSTRACT: Recommendation systems play an important role in the field of e-commerce applications since they provide suggestions to each and every customer based on the reviews and ratings given by the customers. E-commerce has shown to be a promising platform for nowadays business. Customers are now provided a wider set of items to choose from and a lot of companies are migrating from shelf-stores to online markets and offering their products on the web. Recommender Systems have been widely used to exhibit the most appropriate items to users given their past consumption preferences. Recommendation systems are achieving great success in e-Commerce applications, during a live interaction with a customer; recommendation system may apply different techniques to solve the problem of making a correct a...
International Journal of Innovative Research in Computer and Communication Engineering, 2015
Sensitive information modified should be firmly done to verify the integrity of cloud information... more Sensitive information modified should be firmly done to verify the integrity of cloud information, to stop it from being disclosed to or modified by unauthorized parties. Many enterprises supply information storage to the cloud mere a member of a company or information owner can merely share information with completely different members or users with confidentiality. The new public key aggregate policies that prove constant-size ciphertext wherever mere ciphertext unit labeled with sets of attributes and private keys unit associated with structures that management that user is able to decrypt. In several words, the key holder can unleash a constantsize aggregate key for versatile preferences of ciphertext set in cloud storage, but the other encrypted files outside the set keep secret to boot to authentication and privacy preservation this theme tries to satisfy all completely different security wants with key management and achieves higher quantifiability once the quantity of access...
Cloud Computing is an emerging technology which provides services on demand from shared pool of c... more Cloud Computing is an emerging technology which provides services on demand from shared pool of computing resources. Cloud computing has at its core services like platform, infrastructure and software as a service. Benefits of cloud storage are easy access, performance, high availability, cost efficiency and many others. So each and every organization is moving its data to the cloud, that means it uses the storage service provided by the cloud provider. So there is a need to protect the data against unauthorized access, modification or denial of services, data loss, data breach etc. Cloud security is must which will break the hindrance the acceptance of the cloud by the organizations. There are a number of security algorithms which may be implemented to the cloud. This paper is a survey of different security issues to cloud and different cryptographic algorithms adoptable to better security for the cloud.
Cloud Computing:Service models,Types,Database and ssues
The evolution of cloud computing over the past few years is potentially one of the major advances... more The evolution of cloud computing over the past few years is potentially one of the major advances in the history of computing. From a user's perspective, cloud computing involves performing a task using someone else's computers and possibly software. Cloud has given a new meaning to distributed, and off-premises computing. Cloud computing is an architectural model that leverages standardization and consolidation to allow effective and safe sharing of pooled resources. cloud computing refers to the use of scalable, real-time ,Internet-based IT services and resources, incorporating beyond SaaS many key technology trends of the 2000s. Although, Cloud offers great benefits, it also introduces a myriad of security threats to the information and data which is now being ported from on-premises to off-premises. This paper discusses the various service models such as IaaS, PaaS, SaaS. Some products offer Internet-based services—such as storage, middleware, collaboration, and database...
The recent growth in pc networks, and a lot of specifically, the planet Wide internet, copyright ... more The recent growth in pc networks, and a lot of specifically, the planet Wide internet, copyright protection of digital audio becomes a lot of and a lot of necessary. Digital audio watermarking has drawn in depth attention for copyright protection of audio information. A digital audio watermarking may be a method of embedding watermarks into audio signal to point out genuineness and possession. Our technique supported the embedding watermark into audio signal and extraction of watermark sequence. We tend to propose a brand new watermarking system victimization separate Fourier remodel (DFT) for audio copyright protection. The watermarks area unit embedded into the best outstanding peak of the magnitude spectrum of every non-overlapping frame. This watermarking system can provides robust lustiness against many styles of attacks like noise addition, cropping, re-sampling, re-quantization, and MP3 compression and achieves similarity values starting from thirteen sound unit to twenty sou...
Uploads
Papers by nitin chopde