Niharika Singh

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
In the cloud computing environment, the privacy of the electronic data is a serious issue that requires special considerations. We have presented a state-of-the-art review of the methodologies and approaches that are currently being used to cope with the significant issue of privacy. We have categorized the privacy-preserving approaches into four(More)
To handle large amount of real-time data in cloud computing very efficient, secure and concurrent data management scheme is needed. Hence in this paper, Bloom Filter as Concurrency Controller (BFCC) is proposed that uses bloom filter technique for the version verification and identification that controls multiple version concurrencies (MVCC). Work is(More)
4G wireless communication allows for significant increases in data rates over 2G and 3g and 3.5G wireless technologies. 4G is based on TCP/IP architecture and thus by moving to an anticipated increase in security issues compared to previous generations. LTE is composed with cryptographic strategies, common verification between LTE network elements with(More)
Cloud computing is an unceasing technology emerging as a boon in an IT industry that ensures online, on demand services which are accessible anywhere. Explosive rise of data in cloud computing trends more service requests and load on cloud impose a challenge on service provider of uniformly directing the load in distributed environment. To overcome this(More)
Cloud Computing is an alluring technology which provides elasticity, scalability and cost-efficiency over a network. In recent years, database obtrusion has become a crucial feature in cloud computing. Rapid data growth and need to keep it safer require organizations to integrate how they manage and use their data. To meet these necessities, No-SQL has(More)
Over transactional database systems MultiVersion concurrency control is maintained for secure, fast and efficient access to the shared data file implementation scenario. An effective coordination is supposed to be set up between owners and users also the developers & system operators, to maintain inter-cloud & intra-cloud communication Most of the(More)
The 4G network are cellular network which provides higher bandwidth and fast speed but there are few security flaws and thus to protect the users privacy,a very well defined security support is mandatory. The attacker can launch a variety of active and passive attacks. Thus security mechanism is to be defined for call security in 4G/LTE network. The(More)
  • 1