SSL Based Cryptography Data Management in Private Cloud Computing
DOI:
https://doi.org/10.26438/ijcse/v7i2.439442Keywords:
Cryptography, Privatecloud computing, SSLAbstract
As a personal or business cloud computing user can processing their accumulated information on the 'cloud', via an Internet connection. The main attitude following this form is for providing, processing, storing “as a service.” Technologies such as cluster have all aimed at providing permission to accessing huge amount of information on entirely implicit way by combine the resources and recommending distinct sight of the structure. Network security is goings-on which were modelled for preventing our data while used on the network. It was included on both the technologies of hardware as well as software. Network security technology achieved variety of its targets such as coercions and prevents them from stabbing or extending on the network in this paper SSL handled the data in private cloud computing.
References
[1] O. Freier P. Karlton and P. C. Kocher. The SSL Protocol,Version 3.0. NetscapeCommunications, 1996, http://wp.netscape.com/eng/ssl3/draft302.txt (2003).
[2] National Institute of Standards and Technologies. DataEncryption Standard. U.S.Dpt. of Commerce, December 1993.
[3] ANSI. American National Standard for Financial InstitutionKey Management (wholesale). ANSI, 1985
[4] R. Rivest. A Description of the RC2(r) EncryptionAlgorithm, RFC 2268. Network
[5] Working Group, 1998, ftp://ftp.rfc-editor.org/innotes/rfc2268.txt (2003).
[6] Schneier. Applied Cryptography, 2ed. John Wiley andSons, 1996.
[7] R. Rivest. TheMD-5 Message-Digest Algorithm, RFC1321. John Wiley andSons,1996, ftp://ftp.rfc-editor.org/innotes/rfc1321.txt (2003)
[8] Chetan M Bulla , Satish S Bhojannavar and Vishal M Danawade, “Cloud Computing: Research Activities and Challenges”, International Journal of Emerging Trends & Technology in Computer Science, Vol 2, No. 5, 2013, pp.206-214
[9] Palvinder Singh, Er. Anurag Jain, “Survey Paper on Cloud Computing”, International Journal of Innovations in Engineering and Technology, Vol 3 No. 4, 2014, pp.84-89
[10] .D2RQ. http://sites.wiwiss.fu-berlin.de/suhl/bizer/D2RQ/
[11] Virtuoso.http://virtuoso.openlinksw.com/wiki/main/Main/VOSSQL
[12] P. Mell and T. Grance, The NIST definition of cloud computing
[13] S. Jha et al., Programming Abstractions for Large-scale Distributed Applications, submitted to ACM Computing Surveys;draftathttp://www.cct.lsu.edu/Bsjha/publications/dpa_surveypaper.pdf.
[14] Semantic web technologies in SSLbased cryptography data management D.Meenakshi,T.Malathi,V.Karthika Devi ijesird , Vol. II Issue IX March 2016/596-599
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
