ENHANCEMENT OF CLOUD RESOURCES SECURITY USING VERIFICATION CODE IJTSRD
The advancement in robotics has led to Cloud computing security or simply cloud security refers to a broad set of policies, technologies and controls deployed to protect data application and the associated infrastructure of cloud computing. The aim of this work was to address and minimize the problem of unauthorized access to information and applications […]
Reducing Energy Consumption in Smart System through Mobilouds Framework IJTSRD
Mobile cloud computing (MCC) it’s related energy implication are seen everywhere in large-scale. Offloading computationally raised endeavor’s to the cloud datacentres being the basic thought driving MCC (Mobile Cloud Computing), a vast segment of the mobile terminal assets partaking in the MCC (mobile Cloud Computing) aggregate execution are wasted as they remain sit out of […]
Survey on Security Threats in Cloud Computing IJTSRD
Cloud computing is a new and innovative technology, which serves resources as a service to cloud user. Cloud computing technology provides optimum utilization of computing resources in less cost, which attract organization to be part of cloud customer market. Day by day cloud users are getting increases. Cloud serves IaaS, PaaS, SaaS and DaaS as […]
Framework of Object Detection and Classification High Performance Using Video Analytics in Cloud IJTSRD
Video analytics framework detection performance is worked at cloud. Object detection and classification are the basic tasks in video analytics and become the initial point for other complex submissions. Old-fashioned video analytics approaches are manual and time consuming. These are particular due to the very participation of human factor. This paper present a cloud based […]
Enhancing Availability of Data In Mixed Homomorphic Encryption In Cloud IJTSRD
In Forthcoming times of information technology companies, cloud computing updated as the structural model. There are so many benefits of cloud computing in technical as well as in organization. But still there are many new objections will carried in cloud computing for example in data security in cloud storage. There are many approaches available for […]