Enhancing Cloud Computing Security by Using Pixel Key Pattern

Authors

  • Randeep Kaur Research Scholar, Punjabi University, Patiala
  • Jagroop Kaur Assistant Professor, Punjabi University, Patiala

DOI:

https://doi.org/10.24297/ijct.v14i7.1894

Keywords:

Cloud Computing, Cloud Security, Confidentiality, Security Issues, Zones, Grouping.

Abstract

Cloud is a term used as a metaphor for the wide area networks (like internet) or any such large networked environment. It came partly from the cloud-like symbol used to represent the complexities of the networks in the schematic diagrams. It represents all the complexities of the network which may include everything from cables, routers, servers, data centers and all such other devices. Cloud based systems saves data off multiple organizations on shared hardware systems. Data segregation is done by encrypting data of users, but encryption is not complete solution. We can do segregate data by creating virtual partitions of data for saving and allowing user to access data in his partition only. We will be implementing cloud security aspects for data mining by implementing cloud system. After implementing cloud infrastructure for data mining for cloud system we shall be evaluating security measure for data mining in cloud. We will be fixing threats in data mining to Personal/private data in cloud systems.  

Downloads

Download data is not yet available.

Author Biographies

Randeep Kaur, Research Scholar, Punjabi University, Patiala

Department of Computer Engineering

Jagroop Kaur, Assistant Professor, Punjabi University, Patiala

Department of Computer Engineering

Downloads

Published

2015-05-16

How to Cite

Kaur, R., & Kaur, J. (2015). Enhancing Cloud Computing Security by Using Pixel Key Pattern. INTERNATIONAL JOURNAL OF COMPUTERS &Amp; TECHNOLOGY, 14(7), 5919–5928. https://doi.org/10.24297/ijct.v14i7.1894

Issue

Section

Research Articles

Most read articles by the same author(s)