Learn More
— Trustworthiness especially for service oriented system is very important topic now a day in IT field of the whole world. There are many successful E-commerce organizations presently run in the whole world, but E-commerce has not reached its full potential. The main reason behind this is lack of Trust of people in e-commerce. Again, proper models are still(More)
— The cloud computing platform gives people the opportunity for sharing resources, services and information among the people of the whole world. In private cloud system, information is shared among the persons who are in that cloud. For this, security or personal information hiding process hampers. In this paper we have proposed new security architecture(More)
—Trustworthiness especially for service oriented system is very important topic now a day in IT field of the whole world. Certain Trust Model depends on some certain values given by experts and developers. Here, main parameters for calculating trust are certainty and average rating. In this paper we have proposed an Extension of Certain Trust Model, mainly(More)
— Cloud Computing is becoming a viable computing solution for services oriented computing. Several open-source cloud solutions are available to these supports. Open-source software stacks offer a huge amount of customizability without huge licensing fees. As a result, open source software are widely used for designing cloud, and private clouds are being(More)
— This paper addresses the impact of Virtual Memory Streaming (VMS) technique in provisioning virtual machines (VMs) in cloud environment. VMS is a scaling virtualization technology that allows different virtual machines rapid scale, high performance, and increase hardware utilization. Traditional hypervisors do not support true no-downtime live migration,(More)
In the present scenario security is biggest issue over internet cloud computing acronym is served everywhere in fast and growing computer generation. So security over the cloud is prime concern. In this paper YAK and ECC are security measures use over the cloud YAK is an asymmetric key cryptography. Whereas ECC is an encryption algorithm. So using YAK and(More)
—Cloud computing platform gives people the opportunity for sharing resources, services and information among the people of the whole world. In private cloud system, information is shared among the persons who are in that cloud. Presently, different types of internet based systems are running in Cloud Computing environment. E-commerce is one of them. Present(More)
—At the present world of IT, ensuring Trust is a very important topic; especially for service oriented systems. In the present trust models, particularly in Certain Trust model the main parameters of the representational model portion are uncertainty and average rating which are based on propositional logic where the possible values for them are considered(More)
Biometric technology is used to identify a person based on his/her physical behavioral characteristics. One of the extensive uses of biometric technology is a fingerprint recognition system. The technology has broad use mainly for its easiness, reliability and accuracy in human identification process. This paper presents work done on minutiae based palmtop(More)
  • 1