[PDF][PDF] HONEYWORD ENCRYPTION MECHANISM IN NETWORK SECURITY

A Sonavane, J Jena, P Varsha, M Koul - researchgate.net
Banking systems always needs escalated security solutions. In tradition websites security
measures are very low resulting easily hack able server systems. We are proposing a new …

[PDF][PDF] A Review on Privacy Preserving Data mining

MB Shabija, PL Lekshmy - researchgate.net
Data mining technology has emerged as an identifying patterns and trends from large
quantities of data. Data mining is being used in wide areas such as banking, medicine …

[PDF][PDF] SECURING THE DATA IN THE CLOUD USING TWO FISH ALGORITHM

PDK Reddy - researchgate.net
In 2016 Perez et. al proposed an data driven access control scheme for self-ensured
information that can keep running in entrusted CSPs. Their plan is helpless against Man-in …

[PDF][PDF] DIFFERENTIAL AUTHORIZATION DUPLICATE CHECK IN HYBRID CLOUD ARCHITECTURE

V Deepak, B Pratap, D Karthik, S Samantaray… - researchgate.net
Data duplication or intelligent compression is a method for eliminating duplicate copies of
redundant data, and has been widely used in cloud services to decrease the amount of …

[PDF][PDF] CLASSIFICATION OF BIG DATA USING SUPPORT VECTOR MACHINE

MP Bonde, MS Barahate - researchgate.net
In this project, Support Vector Machine is used for classifying big data. Support Vector
Machine is supervised learning algorithm currently used in machine learning for classifying …

[PDF][PDF] DYNAMIC SLOT ALLOCATION TECHNIQUE FOR MAPREDUCE CLUSTERS

N CHANDRAMOULI, V BAPUJI - researchgate.net
MapReduce is a famous parallel figuring worldview for expansive scale information
handling in groups and server farms. Nonetheless, the space usage can be low, particularly …

[PDF][PDF] IOT: SOCITAL APPLICATION

P Gajjalwar, DV Rojatkar - researchgate.net
Internet of Things (IOT), which is creating a huge network of billions or trillions of “Things”
communicating with one another, they are facing many application and technical …

[PDF][PDF] Survey on Data Storage and Backup Methodologies

T Ghadge, P Swarnalatha - researchgate.net
In today's world more than five billion Gigabytes of data is generated every ten minutes.
Managing and protection of the tremendous data becomes major concern as data can be …

[PDF][PDF] Research Planning in Cloud Technologies

P Gokani - researchgate.net
Cloud computing is the latest effort in delivering computing resources as a service. It
represents a shift away from computing as a product that is purchased, to computing as a …

[PDF][PDF] PRIVACY OF USERS AND OF SOCIAL NETWORKING SITES

S Kumari, VK Singh - researchgate.net
Social Networking Sites are the part of life style of people today. The Social Networking Sites
provide the wider range of services mostly for free. The users of these sites are from all age …