ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Variation of band gap energy with temperature of tin oxide thin films by spray pyrolysis

Journal: International Journal of Application or Innovation in Engineering & Management (IJAIEM) (Vol.5, No. 11)

Publication Date:

Authors : ;

Page : 70-72

Keywords : Keywords: Data mining; Cloud computing; privacy; databases and security; Encyption;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

ABSTRACT Data mining has been considered as an essential component in business domain. The objective is to gain the understanding of the project objectives and business requirements, and then converting this knowledge into a data mining problem definition and a preliminary plan to achieve the objectives. But the current needs of IT make the Cloud computing comes into existence. Cloud computing provides means to improve or add abilities on- demand without making an investment in setting up infrastructures, training new employees. Reasoning processing involves any subscription-based or pay-per-use support that, immediately over the Online, expands ITs current abilities. Recently cloud computing has been facing lots of security issues regarding privacy of data. To protect it from unethical managers and attackers, researches are being conducted on application of a variety of cryptography systems such as searchable encryption and proxy re-encryption to Cloud storage system. However, existing searchable encryption technology is inconvenient in the cloud storage environment in which the user uploads data in person, and those data are shared with others, whenever it is necessary to do, and those with whom data are shared change frequently.In this paper we discuss several technologies to make the data stored in cloud safe. These technologies can be divided into two parts: Storage protect and Access protect.

Last modified: 2016-12-14 18:23:20