Selvan et al., 2021 - Google Patents
Secured Image Retrieval from Cloud Repository Using Image Encryption SchemeSelvan et al., 2021
- Document ID
- 13500172695017168149
- Author
- Selvan M
- Mary V
- Abhiram P
- Reddy R
- Publication year
- Publication venue
- Advances in Systems, Control and Automations: Select Proceedings of ETAEERE 2020
External Links
Snippet
Proposing a safe system for re-appropriated defense in broad shared picture storehouses to safeguard efficiency and recovery. Distributed computing is another type of web-based figuring that on request gives PCs and various gadgets shared handling assets and …
- 238000011084 recovery 0 abstract description 5
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5005—Allocation of resources, e.g. of the central processing unit [CPU] to service a request
- G06F9/5027—Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals
- G06F9/505—Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals considering the load
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5005—Allocation of resources, e.g. of the central processing unit [CPU] to service a request
- G06F9/5027—Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals
- G06F9/5055—Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals considering software capabilities, i.e. software resources associated or available to the machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5083—Techniques for rebalancing the load in a distributed system
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Vijayakumar et al. | RETRACTED ARTICLE: E-Health Cloud Security Using Timing Enabled Proxy Re-Encryption | |
Thota et al. | Big data security framework for distributed cloud data centers | |
Makkar et al. | Secureiiot environment: Federated learning empowered approach for securing iiot from data breach | |
Pramanik et al. | Cyber Security and Network Security | |
Gajmal et al. | Privacy and utility-assisted data protection strategy for secure data sharing and retrieval in cloud system | |
Thillaiarasu et al. | Novel heuristic scheme to enforce safety and confidentiality using feature-based encryption in multi-cloud environment (MCE) | |
Amalraj et al. | Security and privacy issues in federated healthcare–An overview | |
Renuga et al. | Efficient privacy-preserving data sanitization over cloud using optimal GSA algorithm | |
Gattoju et al. | Design of ChaApache framework for securing Hadoop application in big data | |
Hassan et al. | Transaction and Identity Authentication Security Model for E-Banking: Confluence of Quantum Cryptography and AI | |
Maseleno et al. | Hash function based optimal block chain model for the internet of things (IoT) | |
Selvan et al. | Secured Image Retrieval from Cloud Repository Using Image Encryption Scheme | |
Huang et al. | Achieving data privacy on hybrid cloud | |
Russo et al. | Dare‐to‐Share: Collaborative privacy‐preserving recommendations with (almost) no crypto | |
Liu et al. | Efficient query processing with mutual privacy protection for location-based services | |
Fashakh et al. | A proposed secure and efficient big data (Hadoop) security mechanism using encryption algorithm | |
Rowe et al. | The curious case of the half-half bitcoin ECDSA nonces | |
Patel et al. | An approach to analyze data corruption and identify misbehaving server | |
Crowcroft et al. | Analytics without tears or is there a way for data to be anonymized and yet still useful? | |
Mahapatra et al. | Security model for preserving privacy of image in cloud | |
Mu et al. | An assured deletion scheme for encrypted data in Internet of Things | |
Li et al. | Blockchain and OR Based Data Sharing Solution for Internet of Things | |
Alotaibi et al. | Sensitive data exposure: data forwarding and storage on cloud environment | |
Smilarubavathy et al. | Paillier homomorphic encryption with K-means clustering algorithm (phekc) for data mining security in cloud | |
Jain et al. | Privacy-preserving record linkage with block-chains |