[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Selvan et al., 2021 - Google Patents

Secured Image Retrieval from Cloud Repository Using Image Encryption Scheme

Selvan et al., 2021

Document ID
13500172695017168149
Author
Selvan M
Mary V
Abhiram P
Reddy R
Publication year
Publication venue
Advances in Systems, Control and Automations: Select Proceedings of ETAEERE 2020

External Links

Snippet

Proposing a safe system for re-appropriated defense in broad shared picture storehouses to safeguard efficiency and recovery. Distributed computing is another type of web-based figuring that on request gives PCs and various gadgets shared handling assets and …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5005Allocation of resources, e.g. of the central processing unit [CPU] to service a request
    • G06F9/5027Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals
    • G06F9/505Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals considering the load
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5005Allocation of resources, e.g. of the central processing unit [CPU] to service a request
    • G06F9/5027Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals
    • G06F9/5055Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals considering software capabilities, i.e. software resources associated or available to the machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5083Techniques for rebalancing the load in a distributed system

Similar Documents

Publication Publication Date Title
Vijayakumar et al. RETRACTED ARTICLE: E-Health Cloud Security Using Timing Enabled Proxy Re-Encryption
Thota et al. Big data security framework for distributed cloud data centers
Makkar et al. Secureiiot environment: Federated learning empowered approach for securing iiot from data breach
Pramanik et al. Cyber Security and Network Security
Gajmal et al. Privacy and utility-assisted data protection strategy for secure data sharing and retrieval in cloud system
Thillaiarasu et al. Novel heuristic scheme to enforce safety and confidentiality using feature-based encryption in multi-cloud environment (MCE)
Amalraj et al. Security and privacy issues in federated healthcare–An overview
Renuga et al. Efficient privacy-preserving data sanitization over cloud using optimal GSA algorithm
Gattoju et al. Design of ChaApache framework for securing Hadoop application in big data
Hassan et al. Transaction and Identity Authentication Security Model for E-Banking: Confluence of Quantum Cryptography and AI
Maseleno et al. Hash function based optimal block chain model for the internet of things (IoT)
Selvan et al. Secured Image Retrieval from Cloud Repository Using Image Encryption Scheme
Huang et al. Achieving data privacy on hybrid cloud
Russo et al. Dare‐to‐Share: Collaborative privacy‐preserving recommendations with (almost) no crypto
Liu et al. Efficient query processing with mutual privacy protection for location-based services
Fashakh et al. A proposed secure and efficient big data (Hadoop) security mechanism using encryption algorithm
Rowe et al. The curious case of the half-half bitcoin ECDSA nonces
Patel et al. An approach to analyze data corruption and identify misbehaving server
Crowcroft et al. Analytics without tears or is there a way for data to be anonymized and yet still useful?
Mahapatra et al. Security model for preserving privacy of image in cloud
Mu et al. An assured deletion scheme for encrypted data in Internet of Things
Li et al. Blockchain and OR Based Data Sharing Solution for Internet of Things
Alotaibi et al. Sensitive data exposure: data forwarding and storage on cloud environment
Smilarubavathy et al. Paillier homomorphic encryption with K-means clustering algorithm (phekc) for data mining security in cloud
Jain et al. Privacy-preserving record linkage with block-chains