Gitanjali Gupta

Gitanjali Gupta
Lovely Professional University | LPU · Discipline of Computer Science & Engineering

Master of Technology

About

9
Publications
2,363
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
15
Citations
Citations since 2017
6 Research Items
12 Citations
2017201820192020202120222023012345
2017201820192020202120222023012345
2017201820192020202120222023012345
2017201820192020202120222023012345
Additional affiliations
June 2015 - present
PCTE Group of Institutes
Position
  • Professor (Assistant)
Description
  • Teaching: C++, Computer Graphics, Operating System, Data Structure , Computer Networks, Computer Architecture, Digital Circuits & Logic Design, Database Management Systems
Education
June 2011 - May 2014
Guru Nanak Dev Engineering College
Field of study
  • Cloud Computing

Publications

Publications (9)
Article
Full-text available
Data is undoubtedly one of the most significant assets in the current competitive era and to ensure its value is retained, data safety emerges as a principle concern. Another technology asset is the cloud that is proficient in storing data at very little cost or even no cost at all. There are two main challenges that come with storing data in the c...
Book
Full-text available
Role-Based Access Control is an attractive and secure method to access data from cloud storage. Access control method enhances security on Cloud. Role-Based Access Control is a way of authorization in a cloud environment that uses roles as an entity to control the access. Different roles can be assigned to different users based upon their responsib...
Article
Full-text available
Progression in cloud applications has been hindered due to critical issues such as data security and privacy. The aggravating concern remains the ability and access of cloud operators in acquiring sensitive data. Consequently, usage and excitement of cloud computing have remained lukewarm, with users remaining skeptical of the level of confidential...
Preprint
Full-text available
The data security and privacy have become a critical issue that restricts many cloud applications. One of the major concerns about security and privacy is the fact that cloud operators have the opportunity to access sensitive data. This concern dramatically increases user anxieties and reduces the acceptability of cloud computing in many areas, suc...
Article
Full-text available
Abstract: Text Classification is a basic approach of text mining and natural language processing. In previous use, classifiers use human interface features like frequency base and n-gram features which are not able to find non-linearity in features and increase overlapping in features which directly impacts the performance of classifiers. In this p...
Article
Full-text available
Cloud computing provides the different types of services to the client over a network which is delivered by the third party and it reduce the burden from the user end. But security and privacy are the biggest issues in cloud computing. Now days researchers have devoted their work toward security over the cloud. This paper proposed the way to secure...
Article
Full-text available
This paper presents a brief look at virtualization, and its benefits in today's IT world. Server Virtualization results in overall reduction in infrastructure and operating costs, manpower requirements, space. Virtualization provides benefits such as greater efficiency in CPU utilization, better management through central environment control, reduc...
Article
Full-text available
Image enhancement, modifying the value of picture elements, is a classical method for improving the visual perception. Therefore, the processed image is more suitable than the original image for some applications. The most well-known method is the histogram equalization. In the histogram equalization the effect of brightness saturation will be appe...
Article
Full-text available
Cloud Computing is a set of IT Services that are provided to a customer over a network and these services are delivered by third party provider who owns the infrastructure and reduce the burden at user's end. Nowadays researchers devoted their work access control method to enhance the security on Cloud. RBAC is attractive access model because the n...

Network

Cited By

Projects

Project (1)