Asian Journal of Computer Science and Technology, 2019
Cloud computing is ensuring the security of stored data in cloud computing servers is one of the ... more Cloud computing is ensuring the security of stored data in cloud computing servers is one of the mainly demanding issues. In Cloud numerous security issues arises such as authentication, integrity and confidentiality. Different encryption techniques attempt to overcome these data security issues to an enormous extent. Hashing algorithm plays an important role in data integrity, message authentication, and digital signature in modern information security. For security purpose using encryption algorithm like ECC (Elliptic Curve Cryptography) and Authentication of data integrity using hashing algorithms like MD5, and SHA-512. This combination method provides data security, authentication and verification for secure cloud computing.
With explosive immersion of mobile technology supported by 3G/4G, it’s distinctive of being porta... more With explosive immersion of mobile technology supported by 3G/4G, it’s distinctive of being portable and online has injected new vitality to M-learning, people become to explore its potential under the surrounding of M-learning. Based on the technology predominance of 3G/4G, this paper first analyses current situation of M- learning. Then it discusses the teaching relations and learning surrounding of M-learning with support of 3G/4G technology. Then it expounds on the challenges which 3G/4G brings to M-learning. Wish this paper could play an active role in actual research of M-learning.
2017 World Congress on Computing and Communication Technologies (WCCCT), 2017
Cloud Computing heads towards first among the top most developed technologies and with a better p... more Cloud Computing heads towards first among the top most developed technologies and with a better panorama in successive years by companies and organizations. This paper deeply analyses the Cloud Computing security hazards in layer wise such as Service layer (IaaS, SaaS, PaaS) network layer, storage layer and deployment models such as Public, Private and Hybrid cloud environments. In this analysis the traditional and approved security solutions were discussed and its procedure evaluating parameters are denoted here. In this paper new proposal for all the cloud layers issues are going to sort out in single package of solution is discussed.
Cloud computing is the use of on-demand network access and services instead of local resources an... more Cloud computing is the use of on-demand network access and services instead of local resources and external computing networks that are retrieved internet over webbased tools and applications. The new ideas of cloud computing introduce, like resource sharing, multi-tenancy and outsourcing, to make new challenges to the cloud data security. To deal with these challenges, it is essential to tune the security protection measures enhanced for proposing new security policies and traditional computing systems, protocols and various models. The encryption algorithm plays a significant task to secure communication over the network and it is the essential tool for protecting the cloud data security. A comprehensive literature review of the cloud computing algorithmic techniques for empowering security constraints, pros and cons of different algorithms with appropriate results are dealt in this paper. KeywordsAuthentication, Security, Cloud Computing, Encryption, Elliptic Curve Cryptography, ...
With explosive immersion of mobile technology supported by 3G/4G, it’s distinctive of being porta... more With explosive immersion of mobile technology supported by 3G/4G, it’s distinctive of being portable and online has injected new vitality to M-learning, people become to explore its potential under the surrounding of M-learning. Based on the technology predominance of 3G/4G, this paper first analyses current situation of M - learning. Then it discusses the teaching relations and learning surrounding of M-learning with support of 3G/4G technology. Then it expounds on the challenges which 3G/4G brings to Mlearning. Wish this paper could play an active role in actual research of M-learning.
Asian Journal of Computer Science and Technology, 2019
Cloud computing is ensuring the security of stored data in cloud computing servers is one of the ... more Cloud computing is ensuring the security of stored data in cloud computing servers is one of the mainly demanding issues. In Cloud numerous security issues arises such as authentication, integrity and confidentiality. Different encryption techniques attempt to overcome these data security issues to an enormous extent. Hashing algorithm plays an important role in data integrity, message authentication, and digital signature in modern information security. For security purpose using encryption algorithm like ECC (Elliptic Curve Cryptography) and Authentication of data integrity using hashing algorithms like MD5, and SHA-512. This combination method provides data security, authentication and verification for secure cloud computing.
With explosive immersion of mobile technology supported by 3G/4G, it’s distinctive of being porta... more With explosive immersion of mobile technology supported by 3G/4G, it’s distinctive of being portable and online has injected new vitality to M-learning, people become to explore its potential under the surrounding of M-learning. Based on the technology predominance of 3G/4G, this paper first analyses current situation of M- learning. Then it discusses the teaching relations and learning surrounding of M-learning with support of 3G/4G technology. Then it expounds on the challenges which 3G/4G brings to M-learning. Wish this paper could play an active role in actual research of M-learning.
2017 World Congress on Computing and Communication Technologies (WCCCT), 2017
Cloud Computing heads towards first among the top most developed technologies and with a better p... more Cloud Computing heads towards first among the top most developed technologies and with a better panorama in successive years by companies and organizations. This paper deeply analyses the Cloud Computing security hazards in layer wise such as Service layer (IaaS, SaaS, PaaS) network layer, storage layer and deployment models such as Public, Private and Hybrid cloud environments. In this analysis the traditional and approved security solutions were discussed and its procedure evaluating parameters are denoted here. In this paper new proposal for all the cloud layers issues are going to sort out in single package of solution is discussed.
Cloud computing is the use of on-demand network access and services instead of local resources an... more Cloud computing is the use of on-demand network access and services instead of local resources and external computing networks that are retrieved internet over webbased tools and applications. The new ideas of cloud computing introduce, like resource sharing, multi-tenancy and outsourcing, to make new challenges to the cloud data security. To deal with these challenges, it is essential to tune the security protection measures enhanced for proposing new security policies and traditional computing systems, protocols and various models. The encryption algorithm plays a significant task to secure communication over the network and it is the essential tool for protecting the cloud data security. A comprehensive literature review of the cloud computing algorithmic techniques for empowering security constraints, pros and cons of different algorithms with appropriate results are dealt in this paper. KeywordsAuthentication, Security, Cloud Computing, Encryption, Elliptic Curve Cryptography, ...
With explosive immersion of mobile technology supported by 3G/4G, it’s distinctive of being porta... more With explosive immersion of mobile technology supported by 3G/4G, it’s distinctive of being portable and online has injected new vitality to M-learning, people become to explore its potential under the surrounding of M-learning. Based on the technology predominance of 3G/4G, this paper first analyses current situation of M - learning. Then it discusses the teaching relations and learning surrounding of M-learning with support of 3G/4G technology. Then it expounds on the challenges which 3G/4G brings to Mlearning. Wish this paper could play an active role in actual research of M-learning.
Uploads