• Nenhum resultado encontrado

[PDF] Top 20 Securing Data Transfer in Cloud Environment

Has 10000 "Securing Data Transfer in Cloud Environment " found on our website. Below are the top 20 most common "Securing Data Transfer in Cloud Environment ".

Securing Data Transfer in Cloud Environment

Securing Data Transfer in Cloud Environment

... a cloud computing security ...information in standard ways, as well as related data, such as identifiers for software flaws and security configuration ...security. In addition to NIST efforts, ... See full document

5

An Enhanced trusted Image Storing and Retrieval Framework in Cloud Data Storage Service Environment

An Enhanced trusted Image Storing and Retrieval Framework in Cloud Data Storage Service Environment

... service in TISR that we propose to explore is also akin to the literature of secure computation outsourcing [3]_[6], [18], [20], [21], which aims to protects both input and output privacy of the outsourced ... See full document

5

RFID in cloud environment for Attendance monitoring system

RFID in cloud environment for Attendance monitoring system

... RFID, primitively used for automatic identification and tracking has now been extensively used for remote storage and retrieval of the data. RFID is similar to barcode but are far more efficient, easy to ... See full document

7

Multidimensional Service Weight Sequence Mining based on Cloud Service Utilization in Jyaguchi

Multidimensional Service Weight Sequence Mining based on Cloud Service Utilization in Jyaguchi

... Jyaguchi in our experiment because there is a rapid development of cloud computing technology as well as diverse methods of obtaining ...for data mining in this infrastructural ... See full document

6

An Efficient Framework For Enhancing Security In The Cloud Environment

An Efficient Framework For Enhancing Security In The Cloud Environment

... of cloud computing, also discusses the integrity issues that arises ...this in mind, an eficient framework called as User Accountability Framework [UAF] has been introduced which produces accountability, ... See full document

5

Research on Privacy Protection in Big Data Environment

Research on Privacy Protection in Big Data Environment

... harmless data is collected, personal privacy will be exposed. In fact, the security implications of big data are more widely,the threat people faced, is not limited to leak of personal privacy, like ... See full document

5

DEVELOPMENT OF A HETEROGENIC DISTRIBUTED ENVIRONMENT  FOR SPATIAL DATA PROCESSING USING CLOUD TECHNOLOGIES

DEVELOPMENT OF A HETEROGENIC DISTRIBUTED ENVIRONMENT FOR SPATIAL DATA PROCESSING USING CLOUD TECHNOLOGIES

... 2008) in forms of the virtual ...initial data (Florinsky and Filippov, ...windows in DTMs calculation and smoothing, standard values of the major and minor semi-axes of the Krasovsky ellipsoid was ... See full document

6

Migration of networks in multi-cloud environment

Migration of networks in multi-cloud environment

... sent in a short ...recorded in the history, they enter the final iteration (in order to prevent their optimization from performing poorly, if there is an increasing trend in the number of ... See full document

82

Communications with QoS in IoT&Cloud environment

Communications with QoS in IoT&Cloud environment

... the data it sends, then only when enough data is in the queue sends the packet to the other ...if data amounts are very small, which is likely since embedded devices send essential information ... See full document

84

The Improvement and Performance of Mobile Environment Using Both Cloud and Text Computing

The Improvement and Performance of Mobile Environment Using Both Cloud and Text Computing

... protocol in a distributed environment, by utilizing a novel striping ...technique. Cloud can retrieve arbitrarily large blocks of information with a single ...a data placement policy, result ... See full document

7

Designing Expert System for Detecting Faults in Cloud Environment

Designing Expert System for Detecting Faults in Cloud Environment

... response in size before the rate at which the client receives the response will affect the dyno even if the dyno closes the connection, the router will keep sending the response buffer to the ...choice in ... See full document

8

Security Risk Assessment of Cloud Computing Services in a Networked Environment

Security Risk Assessment of Cloud Computing Services in a Networked Environment

... mitigation in their organizations ...Risks in the CC context that is based on six distinct risk dimensions grounded on an extensive literature review, Q-sorting, and expert ...of data collected from ... See full document

12

Cloud Data Storage for Group Collaborations

Cloud Data Storage for Group Collaborations

... communication environment is also well ...facts, in addition to the demand that people desire flexible, convenient, and geographical location independent access to data and services, bring forth the ... See full document

2

Measuring Data Transfer in Heterogeneous IoT Environments

Measuring Data Transfer in Heterogeneous IoT Environments

... the data formats ...the data transfer provided by an IS, without the need of specific knowledge about ...the data transfer and providing results that allows the benchmarking of the ... See full document

70

INFRASTRUCTURE OF SERVICES FOR A SMART CITY USING CLOUD ENVIRONMENT

INFRASTRUCTURE OF SERVICES FOR A SMART CITY USING CLOUD ENVIRONMENT

... and data, to offer to create a balanced environment between the ecosystem and ...private cloud architecture to share hardware and software resources when it is ...of data with other ...pattern ... See full document

15

Securing Cloud System via Internal Control Management

Securing Cloud System via Internal Control Management

... Abstract— Data protection in cloud computing is constantly been an issue of ...The data access should be monitored whenever there is a move from the client ...done in order to ensure ... See full document

4

M2* - mobility to anywhere, an IoT aggregation service platform

M2* - mobility to anywhere, an IoT aggregation service platform

... sensor data is related with the information of the distinct locations where the users spend their time throughout the day ...the data that we have collected, we are particularly interested in ... See full document

7

AROCRYPT: A CONFIDENTIALITY TECHNIQUE FOR SECURING ENTERPRISE’s DATA IN CLOUD

AROCRYPT: A CONFIDENTIALITY TECHNIQUE FOR SECURING ENTERPRISE’s DATA IN CLOUD

... Subhasri P. et al. [16] proposed a Multi-level Encryption algorithm to secure the data in the cloud. The proposed algorithm uses rail fence and ceaser cipher algorithm. Initially, plaintext is ... See full document

9

A New Strategy to Optimize the Load Migration Process in Cloud Environment

A New Strategy to Optimize the Load Migration Process in Cloud Environment

... developments in the internet is introduced by Cloud Computing (CC) ...properties in which every kind of facilities offers to the users in the form of a service ...demands. In such mode, ... See full document

7

AN QUALITY BASED ENHANCEMENT OF USER DATA PROTECTION VIA FUZZY RULE BASED SYSTEMS IN CLOUD ENVIRONMENT

AN QUALITY BASED ENHANCEMENT OF USER DATA PROTECTION VIA FUZZY RULE BASED SYSTEMS IN CLOUD ENVIRONMENT

... far, in cloud computing distinct customer is accessed and consumed enormous amount of services through web, offered by cloud service provider ...However cloud is providing one of the services ... See full document

6

Show all 10000 documents...