SlideShare a Scribd company logo
International Journal of Computing Algorithm, Vol 4(1), June 2015
ISSN(Print):2278-2397
Website: www.ijcoa.com
Effectual Data Integrity Checking Technique Based
on Number Theory
V.Hema1
, M. GanagaDurga2
, G.Yogeswari3
1
Research Scholar, Bharathiar University, Coimbatore
2
Research Supervisor, Bharathiar University, Coimbatore, Assistant Professor, Department of CS,
Govt. Arts College for Women, Sivagangai,
3
Software Engineer,Wiaan Business Corporation Software Lab,Karaikudi
Email: vhema23@gmail.com, mgdurga@yahoo.com
Abstract
Cloud Computing makes data really mobile and a client can simply access a chosen cloud
with any internet accessible device. The espousal and dispersion of Cloud computing are
threatened by unresolved security issues that affect both the cloud provider and the cloud
user. The integrity of data stored in the cloud is one of the challenges to be addressed before
the novel storage model is applied widely. This paper analyses the efficiency issues and
security dodge of an existing scheme and proposes an amended data integrity scheme using
improved RSA and number theory based concept for cloud archive. This scheme of
protecting the integrity of guest virtual machines can be agreed upon by both the cloud and
the customer and can be incorporated in the service level agreement (SLA).Based on
hypothetical analysis, we demonstrate that the proposed scheme has a provably safe and
highly adroit data integrity inspection measure

More Related Content

What's hot

Novel authentication framework for securing communication in internet-of-things
Novel authentication framework for securing communication in internet-of-things Novel authentication framework for securing communication in internet-of-things
Novel authentication framework for securing communication in internet-of-things
IJECEIAES
 
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Amélie Gyrard
 
Data Science, Knowledge Discover, Mining and Learning
Data Science, Knowledge Discover, Mining and LearningData Science, Knowledge Discover, Mining and Learning
Data Science, Knowledge Discover, Mining and Learning
EUBrasilCloudFORUM .
 
IJSRED-V2I1P2
IJSRED-V2I1P2IJSRED-V2I1P2
IJSRED-V2I1P2
IJSRED
 
A Secured Image Sharing on Social Websites
A Secured Image Sharing on Social WebsitesA Secured Image Sharing on Social Websites
A Secured Image Sharing on Social Websites
Association of Scientists, Developers and Faculties
 
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEMSURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
ijiert bestjournal
 
48
4848
An Event-based Middleware for Syntactical Interoperability in Internet of Th...
An Event-based Middleware for Syntactical Interoperability  in Internet of Th...An Event-based Middleware for Syntactical Interoperability  in Internet of Th...
An Event-based Middleware for Syntactical Interoperability in Internet of Th...
IJECEIAES
 
An Enhancement Role and Attribute Based Access Control Mechanism in Big Data
An Enhancement Role and Attribute Based Access Control Mechanism in Big Data  An Enhancement Role and Attribute Based Access Control Mechanism in Big Data
An Enhancement Role and Attribute Based Access Control Mechanism in Big Data
IJECEIAES
 
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVOC...
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVOC...PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVOC...
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVOC...
I3E Technologies
 
A study secure multi authentication based data classification model in cloud ...
A study secure multi authentication based data classification model in cloud ...A study secure multi authentication based data classification model in cloud ...
A study secure multi authentication based data classification model in cloud ...
IJAAS Team
 
Resume_latest_22_01
Resume_latest_22_01Resume_latest_22_01
Resume_latest_22_01Raghu Golla
 
BE CS,IS FINAL YEAR PROJECT LIST FOR ACADEMIC YEAR 2019-2020
BE CS,IS FINAL YEAR PROJECT LIST FOR ACADEMIC YEAR 2019-2020BE CS,IS FINAL YEAR PROJECT LIST FOR ACADEMIC YEAR 2019-2020
BE CS,IS FINAL YEAR PROJECT LIST FOR ACADEMIC YEAR 2019-2020
IGEEKS TECHNOLOGIES
 
Encryption Reprting
Encryption ReprtingEncryption Reprting
Encryption ReprtingChryzzelle
 
33
3333
5
55
DN18 | Ocean Protocol – Empowering a Decentralized Marketplace for The New AI...
DN18 | Ocean Protocol – Empowering a Decentralized Marketplace for The New AI...DN18 | Ocean Protocol – Empowering a Decentralized Marketplace for The New AI...
DN18 | Ocean Protocol – Empowering a Decentralized Marketplace for The New AI...
Dataconomy Media
 

What's hot (19)

Novel authentication framework for securing communication in internet-of-things
Novel authentication framework for securing communication in internet-of-things Novel authentication framework for securing communication in internet-of-things
Novel authentication framework for securing communication in internet-of-things
 
5
55
5
 
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
 
Data Science, Knowledge Discover, Mining and Learning
Data Science, Knowledge Discover, Mining and LearningData Science, Knowledge Discover, Mining and Learning
Data Science, Knowledge Discover, Mining and Learning
 
Pedro-Combining rapid data modelling and ontology services
Pedro-Combining rapid data modelling and ontology servicesPedro-Combining rapid data modelling and ontology services
Pedro-Combining rapid data modelling and ontology services
 
IJSRED-V2I1P2
IJSRED-V2I1P2IJSRED-V2I1P2
IJSRED-V2I1P2
 
A Secured Image Sharing on Social Websites
A Secured Image Sharing on Social WebsitesA Secured Image Sharing on Social Websites
A Secured Image Sharing on Social Websites
 
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEMSURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
 
48
4848
48
 
An Event-based Middleware for Syntactical Interoperability in Internet of Th...
An Event-based Middleware for Syntactical Interoperability  in Internet of Th...An Event-based Middleware for Syntactical Interoperability  in Internet of Th...
An Event-based Middleware for Syntactical Interoperability in Internet of Th...
 
An Enhancement Role and Attribute Based Access Control Mechanism in Big Data
An Enhancement Role and Attribute Based Access Control Mechanism in Big Data  An Enhancement Role and Attribute Based Access Control Mechanism in Big Data
An Enhancement Role and Attribute Based Access Control Mechanism in Big Data
 
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVOC...
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVOC...PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVOC...
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVOC...
 
A study secure multi authentication based data classification model in cloud ...
A study secure multi authentication based data classification model in cloud ...A study secure multi authentication based data classification model in cloud ...
A study secure multi authentication based data classification model in cloud ...
 
Resume_latest_22_01
Resume_latest_22_01Resume_latest_22_01
Resume_latest_22_01
 
BE CS,IS FINAL YEAR PROJECT LIST FOR ACADEMIC YEAR 2019-2020
BE CS,IS FINAL YEAR PROJECT LIST FOR ACADEMIC YEAR 2019-2020BE CS,IS FINAL YEAR PROJECT LIST FOR ACADEMIC YEAR 2019-2020
BE CS,IS FINAL YEAR PROJECT LIST FOR ACADEMIC YEAR 2019-2020
 
Encryption Reprting
Encryption ReprtingEncryption Reprting
Encryption Reprting
 
33
3333
33
 
5
55
5
 
DN18 | Ocean Protocol – Empowering a Decentralized Marketplace for The New AI...
DN18 | Ocean Protocol – Empowering a Decentralized Marketplace for The New AI...DN18 | Ocean Protocol – Empowering a Decentralized Marketplace for The New AI...
DN18 | Ocean Protocol – Empowering a Decentralized Marketplace for The New AI...
 

Viewers also liked

絕對邀約
絕對邀約絕對邀約
絕對邀約
renee hsu
 
Why leader one flyer
Why leader one flyerWhy leader one flyer
Why leader one flyerKarl Leblanc
 
No Mining Operations Handled Illegally By VV Mineral
No Mining Operations Handled Illegally By VV MineralNo Mining Operations Handled Illegally By VV Mineral
No Mining Operations Handled Illegally By VV Mineral
shiva rajan
 
Final YFHS Presentation_10.10.2015
Final YFHS Presentation_10.10.2015Final YFHS Presentation_10.10.2015
Final YFHS Presentation_10.10.2015Tamar Gotsadze
 
Ahs sec 4 em prelim p2
Ahs sec 4 em prelim p2Ahs sec 4 em prelim p2
Ahs sec 4 em prelim p2
Cindy Leong
 
Skeletal system 2014
Skeletal system 2014Skeletal system 2014
Skeletal system 2014
Sharda Berfect
 
Common terms in garmetns industry
Common terms in garmetns industryCommon terms in garmetns industry
Common terms in garmetns industry
Azmat Zubair
 
Cell membrane physiology and pharmacology
Cell membrane physiology and pharmacology Cell membrane physiology and pharmacology
Cell membrane physiology and pharmacology
Dr Shahid Saache
 

Viewers also liked (8)

絕對邀約
絕對邀約絕對邀約
絕對邀約
 
Why leader one flyer
Why leader one flyerWhy leader one flyer
Why leader one flyer
 
No Mining Operations Handled Illegally By VV Mineral
No Mining Operations Handled Illegally By VV MineralNo Mining Operations Handled Illegally By VV Mineral
No Mining Operations Handled Illegally By VV Mineral
 
Final YFHS Presentation_10.10.2015
Final YFHS Presentation_10.10.2015Final YFHS Presentation_10.10.2015
Final YFHS Presentation_10.10.2015
 
Ahs sec 4 em prelim p2
Ahs sec 4 em prelim p2Ahs sec 4 em prelim p2
Ahs sec 4 em prelim p2
 
Skeletal system 2014
Skeletal system 2014Skeletal system 2014
Skeletal system 2014
 
Common terms in garmetns industry
Common terms in garmetns industryCommon terms in garmetns industry
Common terms in garmetns industry
 
Cell membrane physiology and pharmacology
Cell membrane physiology and pharmacology Cell membrane physiology and pharmacology
Cell membrane physiology and pharmacology
 

Similar to Effectual Data Integrity Checking Technique Based on Number Theory

IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET Journal
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
dbpublications
 
A data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingA data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computing
IJECEIAES
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniques
eSAT Journals
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniques
eSAT Publishing House
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET Journal
 
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
IJERA Editor
 
7132019 Originality Reporthttpsucumberlands.blackboar.docx
7132019 Originality Reporthttpsucumberlands.blackboar.docx7132019 Originality Reporthttpsucumberlands.blackboar.docx
7132019 Originality Reporthttpsucumberlands.blackboar.docx
sleeperharwell
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
eSAT Publishing House
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
ijccsa
 
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
ijccsa
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET Journal
 
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
IOSR Journals
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
IJERA Editor
 
Analysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and MethodologiesAnalysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and Methodologies
IRJET Journal
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
IJERA Editor
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
ijsrd.com
 
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
IJNSA Journal
 
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...
IRJET -  	  A Joint Optimization Approach to Security and Insurance Managemen...IRJET -  	  A Joint Optimization Approach to Security and Insurance Managemen...
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...
IRJET Journal
 

Similar to Effectual Data Integrity Checking Technique Based on Number Theory (20)

IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
 
A data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingA data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computing
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniques
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniques
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
 
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
 
7132019 Originality Reporthttpsucumberlands.blackboar.docx
7132019 Originality Reporthttpsucumberlands.blackboar.docx7132019 Originality Reporthttpsucumberlands.blackboar.docx
7132019 Originality Reporthttpsucumberlands.blackboar.docx
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
 
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
 
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
 
Analysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and MethodologiesAnalysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and Methodologies
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
 
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
 
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...
IRJET -  	  A Joint Optimization Approach to Security and Insurance Managemen...IRJET -  	  A Joint Optimization Approach to Security and Insurance Managemen...
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...
 

More from ijcoa

SPSS: An Effective Tool to Compute Learning Outcomes in Acadamics
SPSS: An Effective Tool to Compute Learning Outcomes in AcadamicsSPSS: An Effective Tool to Compute Learning Outcomes in Acadamics
SPSS: An Effective Tool to Compute Learning Outcomes in Acadamics
ijcoa
 
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining ApproachBugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
ijcoa
 
Motion Object Detection Using BGS Technique
Motion Object Detection Using BGS TechniqueMotion Object Detection Using BGS Technique
Motion Object Detection Using BGS Technique
ijcoa
 
Analysis of Women Harassment in Villages Using CETD Matrix Modal
Analysis of Women Harassment in Villages Using CETD Matrix ModalAnalysis of Women Harassment in Villages Using CETD Matrix Modal
Analysis of Women Harassment in Villages Using CETD Matrix Modal
ijcoa
 
Solving Assignment Problem Using L-R Fuzzy Numbers
Solving Assignment Problem Using L-R Fuzzy NumbersSolving Assignment Problem Using L-R Fuzzy Numbers
Solving Assignment Problem Using L-R Fuzzy Numbers
ijcoa
 
Fuzzy Chroamtic Number of Line Graph using α-Cuts
Fuzzy Chroamtic Number of Line Graph using α-CutsFuzzy Chroamtic Number of Line Graph using α-Cuts
Fuzzy Chroamtic Number of Line Graph using α-Cuts
ijcoa
 
A Study on the Exposures of Rag- Pickers Using Induced Neutrosophic Cognitive...
A Study on the Exposures of Rag- Pickers Using Induced Neutrosophic Cognitive...A Study on the Exposures of Rag- Pickers Using Induced Neutrosophic Cognitive...
A Study on the Exposures of Rag- Pickers Using Induced Neutrosophic Cognitive...
ijcoa
 
Dual Trapezoidal Fuzzy Number and its Applications
Dual Trapezoidal Fuzzy Number and its ApplicationsDual Trapezoidal Fuzzy Number and its Applications
Dual Trapezoidal Fuzzy Number and its Applications
ijcoa
 
Developing and Porting multi-grid solver for CFD application on Intel-MIC pla...
Developing and Porting multi-grid solver for CFD application on Intel-MIC pla...Developing and Porting multi-grid solver for CFD application on Intel-MIC pla...
Developing and Porting multi-grid solver for CFD application on Intel-MIC pla...
ijcoa
 
Saturation Index of π(D(r,s))
Saturation Index of π(D(r,s))Saturation Index of π(D(r,s))
Saturation Index of π(D(r,s))
ijcoa
 
Classification and Prediction of Heart Disease from Diabetes Patients using H...
Classification and Prediction of Heart Disease from Diabetes Patients using H...Classification and Prediction of Heart Disease from Diabetes Patients using H...
Classification and Prediction of Heart Disease from Diabetes Patients using H...
ijcoa
 
Format Preserving Encryption for Small Domain
Format Preserving Encryption for Small DomainFormat Preserving Encryption for Small Domain
Format Preserving Encryption for Small Domain
ijcoa
 
Intuitionistic Double Layered Fuzzy Graph and its Cartesian Product Vertex De...
Intuitionistic Double Layered Fuzzy Graph and its Cartesian Product Vertex De...Intuitionistic Double Layered Fuzzy Graph and its Cartesian Product Vertex De...
Intuitionistic Double Layered Fuzzy Graph and its Cartesian Product Vertex De...
ijcoa
 
Clustering and Classification in Support of Climatology to mine Weather Data ...
Clustering and Classification in Support of Climatology to mine Weather Data ...Clustering and Classification in Support of Climatology to mine Weather Data ...
Clustering and Classification in Support of Climatology to mine Weather Data ...
ijcoa
 
Test Suite Reduction Based on Fault Detection with Cost Optimization
Test Suite Reduction Based on Fault Detection with Cost OptimizationTest Suite Reduction Based on Fault Detection with Cost Optimization
Test Suite Reduction Based on Fault Detection with Cost Optimization
ijcoa
 
Artifact Facet Ranking and It’s Applications
Artifact Facet Ranking and It’s ApplicationsArtifact Facet Ranking and It’s Applications
Artifact Facet Ranking and It’s Applications
ijcoa
 
Micro-Neuro-Sensor Recording of STN Neurons of the Human Brain
Micro-Neuro-Sensor Recording of STN Neurons of the Human BrainMicro-Neuro-Sensor Recording of STN Neurons of the Human Brain
Micro-Neuro-Sensor Recording of STN Neurons of the Human Brain
ijcoa
 
EDM: Finding Answers to Reduce Dropout Rates in Schools
EDM: Finding Answers to Reduce Dropout Rates in SchoolsEDM: Finding Answers to Reduce Dropout Rates in Schools
EDM: Finding Answers to Reduce Dropout Rates in Schools
ijcoa
 
Analysis of Effort Estimation Model in Traditional and Agile (USING METRICS ...
Analysis of Effort Estimation Model in Traditional and Agile  (USING METRICS ...Analysis of Effort Estimation Model in Traditional and Agile  (USING METRICS ...
Analysis of Effort Estimation Model in Traditional and Agile (USING METRICS ...
ijcoa
 
Multi-Biometric Authentication through Hybrid Cryptographic System
Multi-Biometric Authentication through Hybrid Cryptographic SystemMulti-Biometric Authentication through Hybrid Cryptographic System
Multi-Biometric Authentication through Hybrid Cryptographic System
ijcoa
 

More from ijcoa (20)

SPSS: An Effective Tool to Compute Learning Outcomes in Acadamics
SPSS: An Effective Tool to Compute Learning Outcomes in AcadamicsSPSS: An Effective Tool to Compute Learning Outcomes in Acadamics
SPSS: An Effective Tool to Compute Learning Outcomes in Acadamics
 
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining ApproachBugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
 
Motion Object Detection Using BGS Technique
Motion Object Detection Using BGS TechniqueMotion Object Detection Using BGS Technique
Motion Object Detection Using BGS Technique
 
Analysis of Women Harassment in Villages Using CETD Matrix Modal
Analysis of Women Harassment in Villages Using CETD Matrix ModalAnalysis of Women Harassment in Villages Using CETD Matrix Modal
Analysis of Women Harassment in Villages Using CETD Matrix Modal
 
Solving Assignment Problem Using L-R Fuzzy Numbers
Solving Assignment Problem Using L-R Fuzzy NumbersSolving Assignment Problem Using L-R Fuzzy Numbers
Solving Assignment Problem Using L-R Fuzzy Numbers
 
Fuzzy Chroamtic Number of Line Graph using α-Cuts
Fuzzy Chroamtic Number of Line Graph using α-CutsFuzzy Chroamtic Number of Line Graph using α-Cuts
Fuzzy Chroamtic Number of Line Graph using α-Cuts
 
A Study on the Exposures of Rag- Pickers Using Induced Neutrosophic Cognitive...
A Study on the Exposures of Rag- Pickers Using Induced Neutrosophic Cognitive...A Study on the Exposures of Rag- Pickers Using Induced Neutrosophic Cognitive...
A Study on the Exposures of Rag- Pickers Using Induced Neutrosophic Cognitive...
 
Dual Trapezoidal Fuzzy Number and its Applications
Dual Trapezoidal Fuzzy Number and its ApplicationsDual Trapezoidal Fuzzy Number and its Applications
Dual Trapezoidal Fuzzy Number and its Applications
 
Developing and Porting multi-grid solver for CFD application on Intel-MIC pla...
Developing and Porting multi-grid solver for CFD application on Intel-MIC pla...Developing and Porting multi-grid solver for CFD application on Intel-MIC pla...
Developing and Porting multi-grid solver for CFD application on Intel-MIC pla...
 
Saturation Index of π(D(r,s))
Saturation Index of π(D(r,s))Saturation Index of π(D(r,s))
Saturation Index of π(D(r,s))
 
Classification and Prediction of Heart Disease from Diabetes Patients using H...
Classification and Prediction of Heart Disease from Diabetes Patients using H...Classification and Prediction of Heart Disease from Diabetes Patients using H...
Classification and Prediction of Heart Disease from Diabetes Patients using H...
 
Format Preserving Encryption for Small Domain
Format Preserving Encryption for Small DomainFormat Preserving Encryption for Small Domain
Format Preserving Encryption for Small Domain
 
Intuitionistic Double Layered Fuzzy Graph and its Cartesian Product Vertex De...
Intuitionistic Double Layered Fuzzy Graph and its Cartesian Product Vertex De...Intuitionistic Double Layered Fuzzy Graph and its Cartesian Product Vertex De...
Intuitionistic Double Layered Fuzzy Graph and its Cartesian Product Vertex De...
 
Clustering and Classification in Support of Climatology to mine Weather Data ...
Clustering and Classification in Support of Climatology to mine Weather Data ...Clustering and Classification in Support of Climatology to mine Weather Data ...
Clustering and Classification in Support of Climatology to mine Weather Data ...
 
Test Suite Reduction Based on Fault Detection with Cost Optimization
Test Suite Reduction Based on Fault Detection with Cost OptimizationTest Suite Reduction Based on Fault Detection with Cost Optimization
Test Suite Reduction Based on Fault Detection with Cost Optimization
 
Artifact Facet Ranking and It’s Applications
Artifact Facet Ranking and It’s ApplicationsArtifact Facet Ranking and It’s Applications
Artifact Facet Ranking and It’s Applications
 
Micro-Neuro-Sensor Recording of STN Neurons of the Human Brain
Micro-Neuro-Sensor Recording of STN Neurons of the Human BrainMicro-Neuro-Sensor Recording of STN Neurons of the Human Brain
Micro-Neuro-Sensor Recording of STN Neurons of the Human Brain
 
EDM: Finding Answers to Reduce Dropout Rates in Schools
EDM: Finding Answers to Reduce Dropout Rates in SchoolsEDM: Finding Answers to Reduce Dropout Rates in Schools
EDM: Finding Answers to Reduce Dropout Rates in Schools
 
Analysis of Effort Estimation Model in Traditional and Agile (USING METRICS ...
Analysis of Effort Estimation Model in Traditional and Agile  (USING METRICS ...Analysis of Effort Estimation Model in Traditional and Agile  (USING METRICS ...
Analysis of Effort Estimation Model in Traditional and Agile (USING METRICS ...
 
Multi-Biometric Authentication through Hybrid Cryptographic System
Multi-Biometric Authentication through Hybrid Cryptographic SystemMulti-Biometric Authentication through Hybrid Cryptographic System
Multi-Biometric Authentication through Hybrid Cryptographic System
 

Recently uploaded

Body fluids_tonicity_dehydration_hypovolemia_hypervolemia.pptx
Body fluids_tonicity_dehydration_hypovolemia_hypervolemia.pptxBody fluids_tonicity_dehydration_hypovolemia_hypervolemia.pptx
Body fluids_tonicity_dehydration_hypovolemia_hypervolemia.pptx
muralinath2
 
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
University of Maribor
 
Salas, V. (2024) "John of St. Thomas (Poinsot) on the Science of Sacred Theol...
Salas, V. (2024) "John of St. Thomas (Poinsot) on the Science of Sacred Theol...Salas, V. (2024) "John of St. Thomas (Poinsot) on the Science of Sacred Theol...
Salas, V. (2024) "John of St. Thomas (Poinsot) on the Science of Sacred Theol...
Studia Poinsotiana
 
Leaf Initiation, Growth and Differentiation.pdf
Leaf Initiation, Growth and Differentiation.pdfLeaf Initiation, Growth and Differentiation.pdf
Leaf Initiation, Growth and Differentiation.pdf
RenuJangid3
 
DERIVATION OF MODIFIED BERNOULLI EQUATION WITH VISCOUS EFFECTS AND TERMINAL V...
DERIVATION OF MODIFIED BERNOULLI EQUATION WITH VISCOUS EFFECTS AND TERMINAL V...DERIVATION OF MODIFIED BERNOULLI EQUATION WITH VISCOUS EFFECTS AND TERMINAL V...
DERIVATION OF MODIFIED BERNOULLI EQUATION WITH VISCOUS EFFECTS AND TERMINAL V...
Wasswaderrick3
 
THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.
THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.
THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.
Sérgio Sacani
 
platelets_clotting_biogenesis.clot retractionpptx
platelets_clotting_biogenesis.clot retractionpptxplatelets_clotting_biogenesis.clot retractionpptx
platelets_clotting_biogenesis.clot retractionpptx
muralinath2
 
Orion Air Quality Monitoring Systems - CWS
Orion Air Quality Monitoring Systems - CWSOrion Air Quality Monitoring Systems - CWS
Orion Air Quality Monitoring Systems - CWS
Columbia Weather Systems
 
In silico drugs analogue design: novobiocin analogues.pptx
In silico drugs analogue design: novobiocin analogues.pptxIn silico drugs analogue design: novobiocin analogues.pptx
In silico drugs analogue design: novobiocin analogues.pptx
AlaminAfendy1
 
(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...
(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...
(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...
Scintica Instrumentation
 
nodule formation by alisha dewangan.pptx
nodule formation by alisha dewangan.pptxnodule formation by alisha dewangan.pptx
nodule formation by alisha dewangan.pptx
alishadewangan1
 
Mammalian Pineal Body Structure and Also Functions
Mammalian Pineal Body Structure and Also FunctionsMammalian Pineal Body Structure and Also Functions
Mammalian Pineal Body Structure and Also Functions
YOGESH DOGRA
 
NuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final versionNuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final version
pablovgd
 
GBSN- Microbiology (Lab 3) Gram Staining
GBSN- Microbiology (Lab 3) Gram StainingGBSN- Microbiology (Lab 3) Gram Staining
GBSN- Microbiology (Lab 3) Gram Staining
Areesha Ahmad
 
Unveiling the Energy Potential of Marshmallow Deposits.pdf
Unveiling the Energy Potential of Marshmallow Deposits.pdfUnveiling the Energy Potential of Marshmallow Deposits.pdf
Unveiling the Energy Potential of Marshmallow Deposits.pdf
Erdal Coalmaker
 
BLOOD AND BLOOD COMPONENT- introduction to blood physiology
BLOOD AND BLOOD COMPONENT- introduction to blood physiologyBLOOD AND BLOOD COMPONENT- introduction to blood physiology
BLOOD AND BLOOD COMPONENT- introduction to blood physiology
NoelManyise1
 
GBSN - Microbiology (Lab 4) Culture Media
GBSN - Microbiology (Lab 4) Culture MediaGBSN - Microbiology (Lab 4) Culture Media
GBSN - Microbiology (Lab 4) Culture Media
Areesha Ahmad
 
DMARDs Pharmacolgy Pharm D 5th Semester.pdf
DMARDs Pharmacolgy Pharm D 5th Semester.pdfDMARDs Pharmacolgy Pharm D 5th Semester.pdf
DMARDs Pharmacolgy Pharm D 5th Semester.pdf
fafyfskhan251kmf
 
general properties of oerganologametal.ppt
general properties of oerganologametal.pptgeneral properties of oerganologametal.ppt
general properties of oerganologametal.ppt
IqrimaNabilatulhusni
 
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATIONPRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
ChetanK57
 

Recently uploaded (20)

Body fluids_tonicity_dehydration_hypovolemia_hypervolemia.pptx
Body fluids_tonicity_dehydration_hypovolemia_hypervolemia.pptxBody fluids_tonicity_dehydration_hypovolemia_hypervolemia.pptx
Body fluids_tonicity_dehydration_hypovolemia_hypervolemia.pptx
 
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
 
Salas, V. (2024) "John of St. Thomas (Poinsot) on the Science of Sacred Theol...
Salas, V. (2024) "John of St. Thomas (Poinsot) on the Science of Sacred Theol...Salas, V. (2024) "John of St. Thomas (Poinsot) on the Science of Sacred Theol...
Salas, V. (2024) "John of St. Thomas (Poinsot) on the Science of Sacred Theol...
 
Leaf Initiation, Growth and Differentiation.pdf
Leaf Initiation, Growth and Differentiation.pdfLeaf Initiation, Growth and Differentiation.pdf
Leaf Initiation, Growth and Differentiation.pdf
 
DERIVATION OF MODIFIED BERNOULLI EQUATION WITH VISCOUS EFFECTS AND TERMINAL V...
DERIVATION OF MODIFIED BERNOULLI EQUATION WITH VISCOUS EFFECTS AND TERMINAL V...DERIVATION OF MODIFIED BERNOULLI EQUATION WITH VISCOUS EFFECTS AND TERMINAL V...
DERIVATION OF MODIFIED BERNOULLI EQUATION WITH VISCOUS EFFECTS AND TERMINAL V...
 
THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.
THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.
THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.
 
platelets_clotting_biogenesis.clot retractionpptx
platelets_clotting_biogenesis.clot retractionpptxplatelets_clotting_biogenesis.clot retractionpptx
platelets_clotting_biogenesis.clot retractionpptx
 
Orion Air Quality Monitoring Systems - CWS
Orion Air Quality Monitoring Systems - CWSOrion Air Quality Monitoring Systems - CWS
Orion Air Quality Monitoring Systems - CWS
 
In silico drugs analogue design: novobiocin analogues.pptx
In silico drugs analogue design: novobiocin analogues.pptxIn silico drugs analogue design: novobiocin analogues.pptx
In silico drugs analogue design: novobiocin analogues.pptx
 
(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...
(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...
(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...
 
nodule formation by alisha dewangan.pptx
nodule formation by alisha dewangan.pptxnodule formation by alisha dewangan.pptx
nodule formation by alisha dewangan.pptx
 
Mammalian Pineal Body Structure and Also Functions
Mammalian Pineal Body Structure and Also FunctionsMammalian Pineal Body Structure and Also Functions
Mammalian Pineal Body Structure and Also Functions
 
NuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final versionNuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final version
 
GBSN- Microbiology (Lab 3) Gram Staining
GBSN- Microbiology (Lab 3) Gram StainingGBSN- Microbiology (Lab 3) Gram Staining
GBSN- Microbiology (Lab 3) Gram Staining
 
Unveiling the Energy Potential of Marshmallow Deposits.pdf
Unveiling the Energy Potential of Marshmallow Deposits.pdfUnveiling the Energy Potential of Marshmallow Deposits.pdf
Unveiling the Energy Potential of Marshmallow Deposits.pdf
 
BLOOD AND BLOOD COMPONENT- introduction to blood physiology
BLOOD AND BLOOD COMPONENT- introduction to blood physiologyBLOOD AND BLOOD COMPONENT- introduction to blood physiology
BLOOD AND BLOOD COMPONENT- introduction to blood physiology
 
GBSN - Microbiology (Lab 4) Culture Media
GBSN - Microbiology (Lab 4) Culture MediaGBSN - Microbiology (Lab 4) Culture Media
GBSN - Microbiology (Lab 4) Culture Media
 
DMARDs Pharmacolgy Pharm D 5th Semester.pdf
DMARDs Pharmacolgy Pharm D 5th Semester.pdfDMARDs Pharmacolgy Pharm D 5th Semester.pdf
DMARDs Pharmacolgy Pharm D 5th Semester.pdf
 
general properties of oerganologametal.ppt
general properties of oerganologametal.pptgeneral properties of oerganologametal.ppt
general properties of oerganologametal.ppt
 
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATIONPRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
 

Effectual Data Integrity Checking Technique Based on Number Theory

  • 1. International Journal of Computing Algorithm, Vol 4(1), June 2015 ISSN(Print):2278-2397 Website: www.ijcoa.com Effectual Data Integrity Checking Technique Based on Number Theory V.Hema1 , M. GanagaDurga2 , G.Yogeswari3 1 Research Scholar, Bharathiar University, Coimbatore 2 Research Supervisor, Bharathiar University, Coimbatore, Assistant Professor, Department of CS, Govt. Arts College for Women, Sivagangai, 3 Software Engineer,Wiaan Business Corporation Software Lab,Karaikudi Email: vhema23@gmail.com, mgdurga@yahoo.com Abstract Cloud Computing makes data really mobile and a client can simply access a chosen cloud with any internet accessible device. The espousal and dispersion of Cloud computing are threatened by unresolved security issues that affect both the cloud provider and the cloud user. The integrity of data stored in the cloud is one of the challenges to be addressed before the novel storage model is applied widely. This paper analyses the efficiency issues and security dodge of an existing scheme and proposes an amended data integrity scheme using improved RSA and number theory based concept for cloud archive. This scheme of protecting the integrity of guest virtual machines can be agreed upon by both the cloud and the customer and can be incorporated in the service level agreement (SLA).Based on hypothetical analysis, we demonstrate that the proposed scheme has a provably safe and highly adroit data integrity inspection measure