{"title":"Secured Cloud Computing Model Using Cryptographic Techniques and Its Comparative Analysis Using Semantics and Task Scheduling","authors":"Dr. S Sathish Kumar, Varsha Sharma","doi":"10.2139/ssrn.3310095","DOIUrl":null,"url":null,"abstract":"Business derives technology and technology enables Business” and the best and live example to prove the above technology is cloud computing and cryptography. As we all know from last one decade everything has changed the markets have transformed to e-market and from cash transactions we have switched over to e-wallet and online transactions but as these resources and technologies evolves they brings some drastic changes within them. Space and security are the two major concerns where space means the networks, storages, database and applications where security includes security of data and records in every sense Cloud computing resolves the problem of space as it provides space and access to networks, applications. Whereas cryptography ensures the security of data. In this research paper we are going to discuss that how cloud computing and Elliptic Curve Cryptography (ECC) when combined together makes it more easy safe and secure for user. Semantic Computing is an extension of Semantic Web. It connects and combines technologies such as software engineering, user interface, programming language, grid computing and pervasive computing, natural language processing, artificial intelligence, among others, into a complete and unified theme.","PeriodicalId":169525,"journal":{"name":"IRPN: Innovation Networks (Topic)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IRPN: Innovation Networks (Topic)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2139/ssrn.3310095","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Business derives technology and technology enables Business” and the best and live example to prove the above technology is cloud computing and cryptography. As we all know from last one decade everything has changed the markets have transformed to e-market and from cash transactions we have switched over to e-wallet and online transactions but as these resources and technologies evolves they brings some drastic changes within them. Space and security are the two major concerns where space means the networks, storages, database and applications where security includes security of data and records in every sense Cloud computing resolves the problem of space as it provides space and access to networks, applications. Whereas cryptography ensures the security of data. In this research paper we are going to discuss that how cloud computing and Elliptic Curve Cryptography (ECC) when combined together makes it more easy safe and secure for user. Semantic Computing is an extension of Semantic Web. It connects and combines technologies such as software engineering, user interface, programming language, grid computing and pervasive computing, natural language processing, artificial intelligence, among others, into a complete and unified theme.