A Competent Multi-Keyword Exploration Scheme over Encrypted Data in Cloud IJTSRD
Cloud computing is an emerging technology in the present scenario which enhances enormous data storage and its processing. Various issues are present in maintaining the cloud environment. Some among them include data privacy and data confidentiality faced by the data owners while storing their private data onto the cloud. The domain of Data mining mainly […]
Content Based Image Retrieval An Assessment IJTSRD
The explosive increase and ubiquitous accessibility of visual data on the Web have led to the prosperity of research activity in image search or retrieval. With the ignorance of visual content as a ranking clue, methods with text search techniques for visual retrieval may suffer inconsistency between the text words and visual content. Content based […]
Avoiding Data Piracy in Artworks using Blockchain IJTSRD
With the tremendous development of internet, we can share any media from anywhere in the world. This paved the way for data sharing illegally ‘“ pirated versions of data shared among persons. In our proposed system, the original data (use case taken ‘“ Song) will be embedded with a hash value (SHA-256) and then deployed […]
The Behavior of the Television Audience by TV Rating with Social Networks IJTSRD
This examination looks at the connection between online networking webpage Facebook and TV ratings drawing from group of on looker’s variables of incorporation model of gathering of people conduct. In view of setting of Taiwan broadcasting company programs, this examination gathered measures for Facebook shares, likes, remarks, posts for three classifications of network shows and […]
An Efficient Securing Code Based Cloud Storage using RC5 Encryption Algorithm against Pollution Attacks IJTSRD
The widespread diffusion of distributed and cloud storage solutions has changed dramatically the way users, system designers, and service providers manage their data. Outsourcing data on remote storage provides indeed many advantages in terms of both capital and operational costs. To provide solutions for the above pollution attack and user data breach, we propose an […]