1Research Scholar (CSE), Sagar Institute of Science Technology & Research (RGPV), Bhopal, (India)
2Head, Department of CSE Sagar Institute of Science Technology & Research (RGPV),Bhopal, (India)
3Assistant Prof.Computer science and egg.Sagar Institute of Science Technology & Research (RGPV),Bhopal, (India)
When we store our photos online instead of on our home computer, or use webmail or a social networking site, we are using a “cloud computing” service. Cloud computing is a model of servicedelivery and access where dynamically scalableand virtualized resources are provided as a serviceover the Internet.In this survey we focus on what is cloud computing, how to best use of cloud computing in data security.
The objective of this paper is to survey about various security techniques over cloud platform and show analysis of protection by using various cryptographic techniques which is most useful and helpful in the information security. The work is preceded with a goal to build a security approach at cloud end which will be provided with trusted regarding information storage at cloud end, and would lead to providing only information security and wouldn’t store any data in its system.
1Computer Science Engineering Sagar Institute of Science, Technology and Research Bhopal (India)
2HOD,CSE Sagar Institute of Science, Technology and Research Bhopal (India)
3Assistant Professor Sagar Institute of Science, Technology and Research Bhopal (India)
Email:-email@example.com, firstname.lastname@example.org, email@example.com
Cloud Computing is extremely new and helpful technology for networking world, it functions to cut back electronic waste and dealing setting in virtual platforms and centralized information storage options, it’s terribly advanced and new properties for storage, computer code readying and net primarily based platform services that helps lots to manage network setting in easiest method with safety features. To store data centrally VM placement MBFD technique is very new, and advanced technology which helps in cloud energy minimization. This paper presents a brief survey onVM scheduling and Consolidation in Cloud Computing.
Department of CSE, Sagar Institute of Science Technology and Research, Ratibad, Bhopal-462044 (M.P.) (India)
Query Optimization is an important component of all Database Systems. Designing optimizers which takes less search time yet provides the most optimal query execution plan has been a challenge for DBMS research community in the last decade. Most of the optimization techniques focus on the static compilation of selectivity of base relations. The cost of executing a plan depends heavily on selectivity which keeps changing frequently and thus static compilation provides an inconsistent performance. Adaptive query optimization is an excellent method of generating optimal plans consistently. This paper proposes new hybrid architecture for query optimizers which combine features of adaptive query processing and also reduces the search space for re optimization using reduced plan diagrams and cost diagrams. This hybrid architecture is bound to give more efficient performance as compared to any other optimization technique along with increased robustness and a substantial increase in consistency of selecting most optimal execution plan.
1M.Tech CTA NITTTR, Bhoapl (India)
2National Institute of Technical Teachers’ Training and Research, Bhopal (India)
Email:- firstname.lastname@example.org Email:- email@example.com
The concept of Cloud-Computing can offers the framework in order assist the customers efficiently by adding more robust services also by applications via Internet. This type of computing mechanism is increasingly becoming popular as various types of enterprise implementation and data are moving into cloud platforms.In this major hurdle is to spread this concept of storage over cloud is shortage of trust among the users of this technology.In this system of cloud can be easily threatened by variouscyber-attacks, because most of the computing mechanisms need to contain the security approach in order to secure the virtual devices from the attacks.Also thispaper discussed about thesecurity concern of data which is send towards the remote server through channel or internet. By applying the cloud concept within the organizations, there is few security issues may also discussed.
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License