SSL Based Cryptography Data Management in Private Cloud Computing

Authors

  • Meenakshi D Department of Computer Science,Shrimati Indira Gandhi Colloge,Tiruchippallai,India
  • Devi VK Department of Computer Science,Shrimati Indira Gandhi Colloge,Tiruchippallai,India

DOI:

https://doi.org/10.26438/ijcse/v7i2.439442

Keywords:

Cryptography, Privatecloud computing, SSL

Abstract

As a personal or business cloud computing user can processing their accumulated information on the 'cloud', via an Internet connection. The main attitude following this form is for providing, processing, storing “as a service.” Technologies such as cluster have all aimed at providing permission to accessing huge amount of information on entirely implicit way by combine the resources and recommending distinct sight of the structure. Network security is goings-on which were modelled for preventing our data while used on the network. It was included on both the technologies of hardware as well as software. Network security technology achieved variety of its targets such as coercions and prevents them from stabbing or extending on the network in this paper SSL handled the data in private cloud computing.

References

[1] O. Freier P. Karlton and P. C. Kocher. The SSL Protocol,Version 3.0. NetscapeCommunications, 1996, http://wp.netscape.com/eng/ssl3/draft302.txt (2003).

[2] National Institute of Standards and Technologies. DataEncryption Standard. U.S.Dpt. of Commerce, December 1993.

[3] ANSI. American National Standard for Financial InstitutionKey Management (wholesale). ANSI, 1985

[4] R. Rivest. A Description of the RC2(r) EncryptionAlgorithm, RFC 2268. Network

[5] Working Group, 1998, ftp://ftp.rfc-editor.org/innotes/rfc2268.txt (2003).

[6] Schneier. Applied Cryptography, 2ed. John Wiley andSons, 1996.

[7] R. Rivest. TheMD-5 Message-Digest Algorithm, RFC1321. John Wiley andSons,1996, ftp://ftp.rfc-editor.org/innotes/rfc1321.txt (2003)

[8] Chetan M Bulla , Satish S Bhojannavar and Vishal M Danawade, “Cloud Computing: Research Activities and Challenges”, International Journal of Emerging Trends & Technology in Computer Science, Vol 2, No. 5, 2013, pp.206-214

[9] Palvinder Singh, Er. Anurag Jain, “Survey Paper on Cloud Computing”, International Journal of Innovations in Engineering and Technology, Vol 3 No. 4, 2014, pp.84-89

[10] .D2RQ. http://sites.wiwiss.fu-berlin.de/suhl/bizer/D2RQ/

[11] Virtuoso.http://virtuoso.openlinksw.com/wiki/main/Main/VOSSQL

[12] P. Mell and T. Grance, The NIST definition of cloud computing

[13] S. Jha et al., Programming Abstractions for Large-scale Distributed Applications, submitted to ACM Computing Surveys;draftathttp://www.cct.lsu.edu/Bsjha/publications/dpa_surveypaper.pdf.

[14] Semantic web technologies in SSLbased cryptography data management D.Meenakshi,T.Malathi,V.Karthika Devi ijesird , Vol. II Issue IX March 2016/596-599

Downloads

Published

2019-02-28
CITATION
DOI: 10.26438/ijcse/v7i2.439442
Published: 2019-02-28

How to Cite

[1]
D. Meenakshi and V. K. Devi, “SSL Based Cryptography Data Management in Private Cloud Computing”, Int. J. Comp. Sci. Eng., vol. 7, no. 2, pp. 439–442, Feb. 2019.