EFFICIENT ID BASED SECURED TROLLEY SYSTEM USING CLOUD COMPUTING
نویسندگان
چکیده
منابع مشابه
Secured Health Monitoring System in Mobile Cloud Computing
— With the help of cloud computing, customers can preserve their information into the cloud remotely and utilize on-demand max-quality apps. With the help of a shared pool of calculating resources configurable. Information outsourcing: customers are relieved from the crisis of information preserve and managing. When clients keep their information (bulk size) on the cloud, the integrity of data ...
متن کاملAccessing Secured Data in Cloud Computing Environment
Number of businesses using cloud computing has increased dramatically over the last few years due to the attractive features such as scalability, flexibility, fast start-up and low costs. Services provided over the web are ranging from using provider’s software and hardware to managing security and other issues. Some of the biggest challenges at this point are providing privacy and data securit...
متن کاملAn Efficient Data Security Mechanism in Cloud Computing Using Anonymous ID Algorithm
Cloud computing has evolved from a risky and confusing concept to a strategy that organization large and small are beginning to adopt as part of their to overall computing strategy. Cloud computing is a method of providing a set of shared computing resources that includes application, computing, storage, netorking, development and deployment platforms as well as business processes.. Research on...
متن کاملEfficient Data Mining with Evolutionary Algorithms for Cloud Computing Application
With the rapid development of the internet, the amount of information and data which are produced, are extremely massive. Hence, client will be confused with huge amount of data, and it is difficult to understand which ones are useful. Data mining can overcome this problem. While data mining is using on cloud computing, it is reducing time of processing, energy usage and costs. As the speed of ...
متن کاملA Secured Access Control Technique for Cloud Computing Environment Using Attribute Based Hierarchical Structure and Token Granting System
Cloud computing has drastically condensed the computational and storage costs of outsourced data. The existing access control techniques offer users access provisions centered on the common user attributes like Roles, which reduces the fine-grained access measure. The paper defines a Storage Correctness and Fine-grained Access Provision (SCFAP) scheme, that provides the user an exclusive access...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Engineering Applied Sciences and Technology
سال: 2020
ISSN: 2455-2143
DOI: 10.33564/ijeast.2020.v04i11.086