Article

S4: A Novel & Secure Method for Enforcing Privacy in Cloud Data Warehouses

Authors:
  • Kurukshetra Institute of IT & skill Development
To read the full-text of this research, you can request a copy directly from the authors.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

... Several researchers have presented various strategies for dealing with security considerations. It is needed to look somewhere at comprehensive literature activities undertaken by cybersecurity scholars in this field [11][12][13][14]. ...
Article
Full-text available
Cloud computing is an emerging economical approach that allows businesses to move beyond creating their own IT teams towards outsourcing their applications, systems, including infrastructure requirements. Cloud technology was already emerged as a framework in addition to the fifth infrastructure services, after water, energy, fuel, and telecommunications. Moreover, the IT sector is undergoing a fundamental transition. Earlier, businesses would maintain existing operations by purchasing IT equipment, but then they are implementing technology on top of that architecture. Cloud computing is a paradigm wherein IT technology is rented as well as utilized as needed by the organization. This paper describes a comprehensive investigation of data confidentiality approaches in cloud technology, their limitations as well as various strategies for overcoming them.
... Dell data security and cryptography provide such a level of safety for customers' information whenever it is saved on an external drive or media. Cryptography might be accomplished with either equipment or software [18][19]. ...
Article
Full-text available
Cloud computing is a computer platform that enables users to pool information such as infrastructure, programs, services, and workflows. The cloud is a virtual pool of computational resources. It makes available computer resources in a group to consumers via the network. Cloud computing, as a new computer architecture, intends to openly share a memory, processing, and applications across a large number of clients. Current cloud computing systems have significant limitations in terms of ensuring clients' information confidentially. Because clients' sensitive information is transported in plaintext form to distant workstations controlled and maintained by third-party telecommunications companies, the danger of unauthorized exposure of clients' confidential documents by telecommunications companies is rather significant. A number of methods exist for securing clients' information against external intruders. This paper elaborates on the most recent situation in the investigations of various security protocols for data protection in cloud-based infrastructures.
... Tree Protocol (STP) to transmit STP signals incessantly. to as SU (Server Unit) [22][23][24][25][26]. Every module interacts with the other modules through a set certificate as well as hierarchical rules. ...
Article
Full-text available
Automobiles are becoming more linked, also with the ability to synchronize to cellular telephones, offer atmospheric as well as navigational alerts for vehicle passengers, and even broadcast safety alerts to all other automobiles and nearby infrastructures. Although automobile connectivity or digitalization provides obvious benefits to passenger satisfaction including accident prevention, these have indeed increased potential enabling attackers to take over automobiles that endanger either driver's or pedestrians' life. Since the attackers are capable of hacking vehicular communications, some of the notable automobile attacks became effective. This study expands on discussio
Article
Abstract: National Bank for Agriculture and Rural Development (NABARD) primary function is to touch all aspects of rural economy. Apart from providing financial support to the underserved population of the country, the institution also monitors the functioning and regulation of banks. NABARD have been a boon to millions of rural families across the country.This Paper aims to understand the financial initiatives taken by the NABARD in the rural area.
ResearchGate has not been able to resolve any references for this publication.