Open Access   Article Go Back

SSL Based Cryptography Data Management in Private Cloud Computing

D. Meenakshi1 , V. Karthika Devi2

Section:Survey Paper, Product Type: Journal Paper
Volume-7 , Issue-2 , Page no. 439-442, Feb-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i2.439442

Online published on Feb 28, 2019

Copyright © D. Meenakshi, V. Karthika Devi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: D. Meenakshi, V. Karthika Devi, “SSL Based Cryptography Data Management in Private Cloud Computing,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.439-442, 2019.

MLA Style Citation: D. Meenakshi, V. Karthika Devi "SSL Based Cryptography Data Management in Private Cloud Computing." International Journal of Computer Sciences and Engineering 7.2 (2019): 439-442.

APA Style Citation: D. Meenakshi, V. Karthika Devi, (2019). SSL Based Cryptography Data Management in Private Cloud Computing. International Journal of Computer Sciences and Engineering, 7(2), 439-442.

BibTex Style Citation:
@article{Meenakshi_2019,
author = {D. Meenakshi, V. Karthika Devi},
title = {SSL Based Cryptography Data Management in Private Cloud Computing},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2019},
volume = {7},
Issue = {2},
month = {2},
year = {2019},
issn = {2347-2693},
pages = {439-442},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3683},
doi = {https://doi.org/10.26438/ijcse/v7i2.439442}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i2.439442}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3683
TI - SSL Based Cryptography Data Management in Private Cloud Computing
T2 - International Journal of Computer Sciences and Engineering
AU - D. Meenakshi, V. Karthika Devi
PY - 2019
DA - 2019/02/28
PB - IJCSE, Indore, INDIA
SP - 439-442
IS - 2
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
280 239 downloads 109 downloads
  
  
           

Abstract

As a personal or business cloud computing user can processing their accumulated information on the `cloud`, via an Internet connection. The main attitude following this form is for providing, processing, storing “as a service.” Technologies such as cluster have all aimed at providing permission to accessing huge amount of information on entirely implicit way by combine the resources and recommending distinct sight of the structure. Network security is goings-on which were modelled for preventing our data while used on the network. It was included on both the technologies of hardware as well as software. Network security technology achieved variety of its targets such as coercions and prevents them from stabbing or extending on the network in this paper SSL handled the data in private cloud computing.

Key-Words / Index Term

SSL, Cryptography, Privatecloud computing

References

[1]. O. Freier P. Karlton and P. C. Kocher. The SSL Protocol,Version 3.0. NetscapeCommunications, 1996, http://wp.netscape.com/eng/ssl3/draft302.txt (2003).
[2]. National Institute of Standards and Technologies. DataEncryption Standard. U.S.Dpt. of Commerce, December 1993.
[3]. ANSI. American National Standard for Financial InstitutionKey Management (wholesale). ANSI, 1985
[4]. R. Rivest. A Description of the RC2(r) EncryptionAlgorithm, RFC 2268. Network
[5]. Working Group, 1998, ftp://ftp.rfc-editor.org/innotes/rfc2268.txt (2003).
[6]. Schneier. Applied Cryptography, 2ed. John Wiley andSons, 1996.
[7]. R. Rivest. TheMD-5 Message-Digest Algorithm, RFC1321. John Wiley andSons,1996, ftp://ftp.rfc-editor.org/innotes/rfc1321.txt (2003)
[8]. Chetan M Bulla , Satish S Bhojannavar and Vishal M Danawade, “Cloud Computing: Research Activities and Challenges”, International Journal of Emerging Trends & Technology in Computer Science, Vol 2, No. 5, 2013, pp.206-214
[9]. Palvinder Singh, Er. Anurag Jain, “Survey Paper on Cloud Computing”, International Journal of Innovations in Engineering and Technology, Vol 3 No. 4, 2014, pp.84-89
[10]. .D2RQ. http://sites.wiwiss.fu-berlin.de/suhl/bizer/D2RQ/
[11]. Virtuoso.http://virtuoso.openlinksw.com/wiki/main/Main/VOSSQL
[12]. P. Mell and T. Grance, The NIST definition of cloud computing
[13]. S. Jha et al., Programming Abstractions for Large-scale Distributed Applications, submitted to ACM Computing Surveys;draftathttp://www.cct.lsu.edu/Bsjha/publications/dpa_surveypaper.pdf.
[14]. Semantic web technologies in SSLbased cryptography data management D.Meenakshi,T.Malathi,V.Karthika Devi ijesird , Vol. II Issue IX March 2016/596-599