Notice Board :

Call for Paper
Vol. 4 Issue 5

Submission Start Date:
May 01, 2018

Acceptence Notification Start:
May 10, 2018

Submission End:
May 15, 2018

Final MenuScript Due:
May 25, 2018

Publication Date:
May 31, 2018


                         Notice Board: Call for PaperVol. 4 Issue 5      Submission Start Date: May 01, 2018      Acceptence Notification Start: May 10, 2018      Submission End: May 15, 2018      Final MenuScript Due: May 25, 2018      Publication Date: May 31, 2018




Volume II Issue V

Author Name
Nitin Rajput
Year Of Publication
2016
Volume and Issue
Volume 2 Issue 5
Abstract
Cloud security term refers to a broad field that has to do with the protection of data and cloud systems. Cloud security has historical roots that include ciphers, subterfuge, and other practices whose goals were to protect the confidentiality of written messages. In our era, cloud security is generally understood to involve domains that are involved in the security of IT systems as well as with the non-IT processes that are in interaction with IT systems. The objective of cloud security is to protect data as well as cloud systems from unauthorized access, use, disclosure, disruption, modification, or destruction. We will create public cloud using openshift cloud then apply Advanced Encryption Standard algorithm on file, which will store on cloud storage and also calculate encryption and decryption time.
PaperID
2016/IJRRETAS/6/2016/9610

Author Name
Nitin Rajput
Year Of Publication
2016
Volume and Issue
Volume 2 Issue 5
Abstract
Cloud security term refers to a broad field that has to do with the protection of data and cloud systems. Cloud security has historical roots that include ciphers, subterfuge, and other practices whose goals were to protect the confidentiality of written messages. In our era, cloud security is generally understood to involve domains that are involved in the security of IT systems as well as with the non-IT processes that are in interaction with IT systems. The objective of cloud security is to protect data as well as cloud systems from unauthorized access, use, disclosure, disruption, modification, or destruction. We will create public cloud using openshift cloud then apply Advanced Encryption Standard algorithm on file, which will store on cloud storage and also calculate encryption and decryption time.
PaperID
2016/IJRRETAS/6/2016/9611

Author Name
Tejaswita Salunkhe, Chhaya Nayak
Year Of Publication
2016
Volume and Issue
Volume 2 Issue 5
Abstract
Protection of digital media become unavoidable in today’s world. Due to increase in need to secure digital media from unauthorized access, many watermarking techniques are developed in this paper, we propose a new algorithm for color images along with reversible watermarking. With the help of Discrete Wavelet Transform, watermark embedding and extraction is carried out. Along with Emboss Filter, discrete wavelet transform and discrete cosine transform are used as a composite technique to protect the image from illegitimate users. The Watermarked image’s quality is enhanced by using a composite technique with Emboss filtering. At last we test proposed algorithm on various images with the performance parameter PSNR .The results authenticate that the proposed algorithm improves the quality of cover image.
PaperID
2016/IJRRETAS/6/2016/8611

Author Name
Nandini kranti, Anand Singh Rajawat
Year Of Publication
2016
Volume and Issue
Volume 2 Issue 5
Abstract
Information stockpiling on cloud is given by the administration supplier. Capacity of this information on un-trusted capacity makes secure information sharing a testing issue. Disseminated processing is the new perfect model giving the customer orchestrated organizations which are flexible in nature for Optimized Resource Management Decision System (ORM-DS). Consistently this flexibility is achieved by executing the crucial form of cloud i.e. virtualization. Here the issue basically creates in directing migrations of different virtualization stages and distinctive virtual machines across over physical machines without intrusion framework [1]. Here the associated figuring must ensures the pile altering when different virtual machines keep running on various physical machines. The field of administering resources and there booking start with Cloud based work space and extended to cloud stadium. QoS as the scattered model and taking care of is getting universality is the
PaperID
2016/IJRRETAS/6/2016/8612