- Filter by:
-
Content Type
-
Topic
-
Distributed Big RDF Data Processing and Data Partitioning Using Hadoop in Cloud
Big data business can leverage and benefit from the clouds. The processing and partitioning of big data in cloud is an important challenge. In this system, big RDF datasets is considered as focus for the investigation. The open data movement initiated by the W3C publishes data in RDF format on...
Download Now -
Destination-Based Greedy Routing Protocol for Wireless Sensor Networks
In recent years, a lot of focus has been done on establishing Wireless Sensor Networks (WSNs) for environment monitoring, natural disaster management, military and remote medical systems. When it comes to WSNs, the major problem faced is the implementation of efficient routing protocol that is fault tolerant and can avoid...
Download Now -
A Cumulative Study of DTN Network for Secure Data Transmission
For any country securing military strategies is most important aspect. Conventionally, interceptions and security risks for military communications are exceeded due to less secured data retrieval and less use of DTNs. Evaluating the present strategies nearer to this system, the authors came around products like TASMUS and SBSP. In TASMUS...
Download Now -
Cloud computing is an emerging technology which attracts customers by giving offers like reduced cost, space and virtually unlimited dynamic resources for storage, computation, etc. User shared the sensitive data over the cloud which gives rise to security issues in cloud computing. So, to protect user's data a secure methodology...
Download Now -
Dynamic Aggregate Key Generator for Cloud Computing
Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users' physical possession of their outsourced data, which inevitably poses new security risks...
Download Now -
Efficient Algorithm for Predicting QoS in Cloud Services
Now-a-days, cloud computing is becoming more popular research topic. Building high-quality cloud applications is a critical research problem and it has lot of demand. QoS rankings provide valuable information for making optimal cloud service selection from a set of functionally equivalent service candidates. To obtain QoS values, real-world invocations on...
Download Now -
Human Effects of Enhanced Multiparty Secured Access Control for Online Social Networks
Online Social Networks (OSNs) such as Face book, Google+ and Twitter are inherently designed to enable people to share personal and public information and make social connections with friends, coworkers, colleagues, family and even with strangers. In recent years, the authors have seen unprecedented growth in the application of OSNs....
Download Now -
Requirements Engineering for SaaS Application Security in Cloud Using SQUARE Methodology
The advent of the digital business and the digital workplace is increasing the speed at which mobility and security are disconnecting. Cloud computing is becoming an increasingly established as cost efficient and needs oriented information system at the same time the use of cloud computing systems also involves a number...
Download Now -
Human being can remember graphical notations & signs, very easily & for a long time. This paper is to build a mechanism for password so that the users' password become more secure, remembering durability & easy to create. The authors have implemented for multi-tier authentication system, because multi-tier authentication system...
Download Now -
Multi Owner Based Data Security in Cloud Using Threshold Cryptography: A Survey
Cloud computing has become very trendy service which can offer number of online services as well as online storage of data at low price. Other than these highly advance service there are number challenges like data confidentiality, data integrity and access control of data. There are some approaches which are...
Download Now