Gitanjali GuptaLovely Professional University | LPU · Discipline of Computer Science & Engineering
Master of Technology
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
Citations since 2017
6 Research Items
June 2015 - present
- Professor (Assistant)
- Teaching: C++, Computer Graphics, Operating System, Data Structure , Computer Networks, Computer Architecture, Digital Circuits & Logic Design, Database Management Systems
Data is undoubtedly one of the most significant assets in the current competitive era and to ensure its value is retained, data safety emerges as a principle concern. Another technology asset is the cloud that is proficient in storing data at very little cost or even no cost at all. There are two main challenges that come with storing data in the c...
Role-Based Access Control is an attractive and secure method to access data from cloud storage. Access control method enhances security on Cloud. Role-Based Access Control is a way of authorization in a cloud environment that uses roles as an entity to control the access. Different roles can be assigned to different users based upon their responsib...
Progression in cloud applications has been hindered due to critical issues such as data security and privacy. The aggravating concern remains the ability and access of cloud operators in acquiring sensitive data. Consequently, usage and excitement of cloud computing have remained lukewarm, with users remaining skeptical of the level of confidential...
The data security and privacy have become a critical issue that restricts many cloud applications. One of the major concerns about security and privacy is the fact that cloud operators have the opportunity to access sensitive data. This concern dramatically increases user anxieties and reduces the acceptability of cloud computing in many areas, suc...
Abstract: Text Classification is a basic approach of text mining and natural language processing. In previous use, classifiers use human interface features like frequency base and n-gram features which are not able to find non-linearity in features and increase overlapping in features which directly impacts the performance of classifiers. In this p...
Cloud computing provides the different types of services to the client over a network which is delivered by the third party and it reduce the burden from the user end. But security and privacy are the biggest issues in cloud computing. Now days researchers have devoted their work toward security over the cloud. This paper proposed the way to secure...
This paper presents a brief look at virtualization, and its benefits in today's IT world. Server Virtualization results in overall reduction in infrastructure and operating costs, manpower requirements, space. Virtualization provides benefits such as greater efficiency in CPU utilization, better management through central environment control, reduc...
Image enhancement, modifying the value of picture elements, is a classical method for improving the visual perception. Therefore, the processed image is more suitable than the original image for some applications. The most well-known method is the histogram equalization. In the histogram equalization the effect of brightness saturation will be appe...
Cloud Computing is a set of IT Services that are provided to a customer over a network and these services are delivered by third party provider who owns the infrastructure and reduce the burden at user's end. Nowadays researchers devoted their work access control method to enhance the security on Cloud. RBAC is attractive access model because the n...