JCT - Volume 6 Issue 7 (July 2017)

 


Sr/No/ Title Pdf
1 A SURVEY OVER VARIOUS ACCESS CONTROL AND AUTHENTICATION TECHNIQUES IN CLOUD COMPUTING
Priya Gour, Akshay Varkale

Abstract- In cloud computing data resides in cloud server, that data contains private and confidential data of the user. Thus security of that is the major task in cloud computing. There are various techniques are presented by different researchers to provide a secure access for that data. A review over the various techniques which used to provide security for that data is presented. Role based Access control technique is generally used, but that technique required some enhancement to provide a secure and enhanced framework to access data in cloud server. .

Download
1 WSN: NETWORK QOS AND NETWORK ROUTING AWARE PLATFORM
Ayushi Chouhan, Dhan Pratap Singh

Abstract- The Wireless sensor networking system is the recent communication technique in wireless network in which the schedule and efficient transmission of data is required in order to make an effective delivery of data and transmission in network, various techniques are proposed in order to keep track of schedule and routing and efficiency of the network is calculated. Existing algorithm use the enhancement of AODV which is mobility and direction aware adhoc network routing, which take advantage of mobility speed and direction to create an routing table and environment to send the data packet. The algorithm given by them provides low overhead with high packet delivery ratio. A further enhancement to the system can be done as providing a further parameter such as energy efficient aware routing, providing the routing loads aware technique with AODV such that a better parameter result can be computed over the network. .

Download