You are on page 1of 4

Implementing digital signature with RSA encryption algorithm to enhance the Data Security of cloud in Cloud Computing

This paper appears in: Parallel Distributed and Grid Computing (PDGC), 2010 1st International Conference on Issue Date : 28-30 Oct. 2010 On page(s): 211 Print ISBN: 978-1-4244-7675-6 References Cited: 8 INSPEC Accession Number: 11745612 Digital Object Identifier : 10.1109/PDGC.2010.5679895 Date of Current Version : 06 January 2011

ABSTRACT The cloud is a next generation platform that provides dynamic resource pools, virtualization, and high availability. Today, we have the ability to utilize scalable, distributed computing environments within the confines of the Internet, a practice known as cloud computing. Cloud computing is the Concept Implemented to decipher the Daily Computing Problems, likes of Hardware Software and Resource Availability unhurried by Computer users. Thecloud Computing provides an undemanding and Non ineffectual Solution for Daily Computing. The prevalent Problem Associated with Cloud Computing is the Cloud security and the appropriate Implementation of Cloud over the Network. In this Research Paper, we have tried to assess Cloud Storage Methodology and Data Security incloud by the Implementation of digital signature with RSA algorithm.

The security of cloud computing system enabled by trusted computing technology


This paper appears in: Signal Processing Systems (ICSPS), 2010 2nd International Conference on Issue Date : 5-7 July 2010 Volume : 2 On page(s): V2-11 Print ISBN: 978-1-4244-6892-8 References Cited: 12 INSPEC Accession Number: 11516105 Digital Object Identifier : 10.1109/ICSPS.2010.5555234 Date of Current Version : 23 August 2010

ABSTRACT Cloud computing provides people the way to share distributed resources and services that belong to different organizations or sites. Since cloud computing share distributed resources via the network in the open environment, thus it makes security problems

important for us to develop the cloud computing application. In this paper, we pay attention to the security requirements in cloud computing environment. We proposed a method to build a trusted computing environment for cloud computing system by integrating the trusted computing platform into cloud computing system. We propose a model system in which cloud computing system is combined with trusted computing platform with trusted platform module. In this model, some important security services, including authentication, confidentiality and integrity, are provided in cloud computing system.

Medical Image Archiving, Processing, Analysis and Communication System for Teleradiology
Suapang, P. Dejhan, K. Yimmun, S. Dept. of Telecommun. Eng., King Mongkut's Inst. of Technol. Ladkrabang, Bangkok, Thailand

This paper appears in: TENCON 2010 - 2010 IEEE Region 10 Conference Issue Date : 21-24 Nov. 2010 On page(s): 339 ISSN : pending Print ISBN: 978-1-4244-6889-8 References Cited: 16 INSPEC Accession Number: 11747802 Digital Object Identifier : 10.1109/TENCON.2010.5686025 Date of Current Version : 13 January 2011

ABSTRACT The design and implementation of Medical Image Archiving, Processing, Analysis and Communication System for Teleradiology which DICOM server was developed using software such as Borland Delphi 6.0, PHP and MySQL forimage archive, image compression, image processing, image analysis and image transmission. The system provides the following facilities: (1) DICOMformat image archive. (2) Medical Image Compression. (3) DICOM viewer and Image processing, and (4) Image analysis. The results shown that (1) our system can also convert the image data both single frame and multiframes in normal or automatic DICOM process into the standard DICOM 3.0 format without altering the image data. (2) The resulting images are then compressed with two different techniques-JPEG and JPEG2000. The significant advantage of JPEG2000 over normal JPEG is that the error from JPEG2000 compression is smaller than the error from JPEG. Nevertheless, both methods share a similar mishap; when the compression ratio increases, they both generate more error than the processes on lower compression ratio. (3) our system can open single frame and multiframes such as DICOM, INTERFILE, BITMAP, JPEG and JPEG2000 each of which can exhibit information in. dcm file format with no distortion and image processing which has also the capabilities to zoom in/out and contrast/color map. And, (4) Image analysis sets ROI semiautomatically on region of expected disease based on geometric active contour model

from edge of varianceimage and Canny edge detection. Thence, our system can calculate of Glomerular Filtration Rate (GFR), Effective Renal Plasma Flow (ERPF), and plot of the Time Activity Curve or Renogram The system has been developed and provided medical image services over long distance which showed the usefulness of our approach.

Potential use of Artificial Neural Network in Data Mining


Nirkhi, S. Dept. of Comput. Sci., G.H.Raisoni Coll. of Eng., Nagpur, India

This paper appears in: Computer and Automation Engineering (ICCAE), 2010 The 2nd International Conference on Issue Date : 26-28 Feb. 2010 Volume : 2 On page(s): 339 Print ISBN: 978-1-4244-5585-0 References Cited: 10 INSPEC Accession Number: 11259332 Digital Object Identifier : 10.1109/ICCAE.2010.5451537 Date of Current Version : 19 April 2010

ABSTRACT With the enormous amount of data stored in files, databases, and other repositories, it is increasingly important, to develop powerful means for analysis and perhaps interpretation of such data and for the extraction of interesting knowledge that could help in decision-making. Data Mining, also popularly known as Knowledge Discovery in Databases (KDD), refers to the nontrivial extraction of implicit, previously unknown and potentially useful information from data in databases. Thus data mining is the process of automated extraction of hidden, predictive information from large databases. Data mining includes: extract, transform, and load transaction dataonto the data warehouse system. Neural networks have been successfully applied in a wide range of supervised and unsupervised learning applications. Neural-network methods are not commonly used for data-mining tasks, because they may have complex structure, long training time, and uneasily understandable representation of results & often produce incomprehensible models. However, neural networks have high acceptance ability for noisy data and high accuracy and are preferable in data mining. In this paper, investigation is made to explore application of Artificial Neural Network in Data mining techniques, the key technology and ways to achieve thedata mining based on neural networks are also researched. Given the current state of the art, neural-network deserves a place in the tool boxes of data-mining specialists.

Real-time monitoring of the security for the large construction with wireless FBG sensor network
Zhang, Yuanzhong State Key Laboratory of Petroleum Resource and Prospecting College of Geophysics and Information Engineering China University of Petroleum, Beijing Beijing, People's Republic of China

This paper appears in: E -Business and E -Government (ICEE), 2011 International Conference on Issue Date : 6-8 May 2011 On page(s): 1 Print ISBN: 978-1-4244-8691-5 Digital Object Identifier : 10.1109/ICEBEG.2011.5887136 Date of Current Version : 16 June 2011

ABSTRACT The security monitoring of the large construction is always a problem for the city management in the world. The wireless fiber Bragg grating (FBG) sensor network applying to security monitoring for the large construction is one of the rapidly developing means. In the paper the feasibility analysis of the real monitoring with FBG sensornetwork is introduced. The wireless FBG sensor network composed the FBG temperature, strain and pressure sensor and wireless network communication technology is discussed. Some crucial basic problems, such as sensor characteristics, data acquisition and transmission, networking, real-time data processing and displaying, and the wireless sensor network development are also analyzed. The FBG sensor network with the ability of forecasting and warning has wide potential application perspective in real-time permanent monitoring.

You might also like