SSL Based Cryptography Data Management in Private Cloud Computing
D. Meenakshi1 , V. Karthika Devi2
Section:Survey Paper, Product Type: Journal Paper
Volume-7 ,
Issue-2 , Page no. 439-442, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.439442
Online published on Feb 28, 2019
Copyright © D. Meenakshi, V. Karthika Devi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: D. Meenakshi, V. Karthika Devi, “SSL Based Cryptography Data Management in Private Cloud Computing,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.439-442, 2019.
MLA Style Citation: D. Meenakshi, V. Karthika Devi "SSL Based Cryptography Data Management in Private Cloud Computing." International Journal of Computer Sciences and Engineering 7.2 (2019): 439-442.
APA Style Citation: D. Meenakshi, V. Karthika Devi, (2019). SSL Based Cryptography Data Management in Private Cloud Computing. International Journal of Computer Sciences and Engineering, 7(2), 439-442.
BibTex Style Citation:
@article{Meenakshi_2019,
author = {D. Meenakshi, V. Karthika Devi},
title = {SSL Based Cryptography Data Management in Private Cloud Computing},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2019},
volume = {7},
Issue = {2},
month = {2},
year = {2019},
issn = {2347-2693},
pages = {439-442},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3683},
doi = {https://doi.org/10.26438/ijcse/v7i2.439442}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i2.439442}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3683
TI - SSL Based Cryptography Data Management in Private Cloud Computing
T2 - International Journal of Computer Sciences and Engineering
AU - D. Meenakshi, V. Karthika Devi
PY - 2019
DA - 2019/02/28
PB - IJCSE, Indore, INDIA
SP - 439-442
IS - 2
VL - 7
SN - 2347-2693
ER -
VIEWS | XML | |
280 | 239 downloads | 109 downloads |
Abstract
As a personal or business cloud computing user can processing their accumulated information on the `cloud`, via an Internet connection. The main attitude following this form is for providing, processing, storing “as a service.” Technologies such as cluster have all aimed at providing permission to accessing huge amount of information on entirely implicit way by combine the resources and recommending distinct sight of the structure. Network security is goings-on which were modelled for preventing our data while used on the network. It was included on both the technologies of hardware as well as software. Network security technology achieved variety of its targets such as coercions and prevents them from stabbing or extending on the network in this paper SSL handled the data in private cloud computing.
Key-Words / Index Term
SSL, Cryptography, Privatecloud computing
References
[1]. O. Freier P. Karlton and P. C. Kocher. The SSL Protocol,Version 3.0. NetscapeCommunications, 1996, http://wp.netscape.com/eng/ssl3/draft302.txt (2003).
[2]. National Institute of Standards and Technologies. DataEncryption Standard. U.S.Dpt. of Commerce, December 1993.
[3]. ANSI. American National Standard for Financial InstitutionKey Management (wholesale). ANSI, 1985
[4]. R. Rivest. A Description of the RC2(r) EncryptionAlgorithm, RFC 2268. Network
[5]. Working Group, 1998, ftp://ftp.rfc-editor.org/innotes/rfc2268.txt (2003).
[6]. Schneier. Applied Cryptography, 2ed. John Wiley andSons, 1996.
[7]. R. Rivest. TheMD-5 Message-Digest Algorithm, RFC1321. John Wiley andSons,1996, ftp://ftp.rfc-editor.org/innotes/rfc1321.txt (2003)
[8]. Chetan M Bulla , Satish S Bhojannavar and Vishal M Danawade, “Cloud Computing: Research Activities and Challenges”, International Journal of Emerging Trends & Technology in Computer Science, Vol 2, No. 5, 2013, pp.206-214
[9]. Palvinder Singh, Er. Anurag Jain, “Survey Paper on Cloud Computing”, International Journal of Innovations in Engineering and Technology, Vol 3 No. 4, 2014, pp.84-89
[10]. .D2RQ. http://sites.wiwiss.fu-berlin.de/suhl/bizer/D2RQ/
[11]. Virtuoso.http://virtuoso.openlinksw.com/wiki/main/Main/VOSSQL
[12]. P. Mell and T. Grance, The NIST definition of cloud computing
[13]. S. Jha et al., Programming Abstractions for Large-scale Distributed Applications, submitted to ACM Computing Surveys;draftathttp://www.cct.lsu.edu/Bsjha/publications/dpa_surveypaper.pdf.
[14]. Semantic web technologies in SSLbased cryptography data management D.Meenakshi,T.Malathi,V.Karthika Devi ijesird , Vol. II Issue IX March 2016/596-599