info@ijrretas.com
+91 77710 84928 Support
ijrretas LogoIJRRETAS
  • About
    • About The Journal
    • Aim & Scope
    • Privacy Statement
    • Journal Policies
    • Disclaimer
    • Abstracting and Indexing
    • FAQ
  • Current
  • Archive
  • For Author
    • Submit Paper Online
    • Article Processing Charges
    • Submission Guidelines
    • Manuscript Types
    • Download Article Template
    • Download Copyright Form
  • Editorial Board
    • Editorial Board
    • Editors Responsibilities
  • Conference
  • Contact
  • Pay Online
  • Submit Paper

Recent Papers

Dedicated to advancing knowledge through rigorous research and scholarly publication

  1. Home
  2. Recent Papers

Comparison between Different key sizes of AES on cloud computing

Authors: Nitin Rajput, M.Tech Scholar

Certificate: View Certificate

Abstract

Cloud security term refers to a broad field that has to do with the protection of data and cloud systems. Cloud security has historical roots that include ciphers, subterfuge, and other practices whose goals were to protect the confidentiality of written messages. In our era, cloud security is generally understood to involve domains that are involved in the security of IT systems as well as with the non-IT processes that are in interaction with IT systems. The objective of cloud security is to protect data as well as cloud systems from unauthorized access, use, disclosure, disruption, modification, or destruction. We will create public cloud using openshift cloud then apply Advanced Encryption Standard algorithm on file, which will store on cloud storage and also calculate encryption and decryption time. Keywords: Public Cloud, Cloud Security, AES, Open Shift.

Introduction

We define the concept of cloud computing and cloud services, and we introduce layers and types of cloud computing. We discuss the difference between cloud computing and cloud services. New technologies that enabled cloud computing are presented next. We also discuss cloud computing features, standards, and security issues. We introduce the key cloud computing platforms, their vendors, and their offerings. We discuss cloud computing Challenges and the future of cloud computing.

Conclusion

This paper presenting an algorithm for generating hybrid dimensional association rules mining as a generalization of inter-dimension and Intradimensional rule. The algorithm is based on the concept that the larger number of values/categories in a dimension/attribute means the lower degree of association among the items in the transaction. Moreover, to generalize inter-dimension association and intra-dimensional rules. we measured the following factors for creating our new idea, which are the time and the no of iteration, these factors, are affected by the approach for finding the frequent itemsets. Work has been done to develop an algorithm, which is an improvement over Apriori with using an approach of improved Apriori algorithm for a transactional database.

Copyright

Copyright © 2025 Nitin Rajput, M.Tech Scholar. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Download Paper

Paper Id: IJRRETAS30

Publish Date: 2016-06-01

ISSN: 2455-4723

Publisher Name: ijrretas

About ijrretas

ijrretas is a leading open-access, peer-reviewed journal dedicated to advancing research in applied sciences and engineering. We provide a global platform for researchers to disseminate innovative findings and technological breakthroughs.

ISSN
2455-4723
Established
2015

Quick Links

Home Submit Paper Author Guidelines Editorial Board Past Issues Topics
Fees Structure Scope & Topics Terms & Conditions Privacy Policy Refund and Cancellation Policy

Contact Us

Vidhya Innovative Technology 514, Pukhraj Corporate Navlakha, Indore (M.P) - India

info@ijrretas.com

+91 77710 84928

www.ijrretas.com

Indexed In
Google Scholar Crossref DOAJ ResearchGate CiteFactor
© 2026 ijrretas. All Rights Reserved.
Privacy Policy Terms of Service