Work place: Mathematics Department, Eternal University, Himachal Pradesh, 173101 India
E-mail: surjan.singhbhu@gmail.com
Website:
Research Interests: Biology & Life Sciences, Computational Biology, Solid Modeling, Mathematical Analysis
Biography
Surjan Singh was born in India. He is Assistant Professor in Department of Mathematics, Eternal University, Baru Sahib India. He has done Ph.D. in 2015 from Banaras Hindu University Varanasi, India. He has done M.Phil in 2005, M.Sc. Mathematic in 1997 and B.Sc. in 1995 from Vikram University India. He has done M.Sc. in Computer Science in 2012 and Advance Post Graduate Diploma in Computer Application in 2007 from Maharshi Dayanand University India. He has teaching experience more than eight years. He has been given U.P. Govt. award of best farmer of Tehsil – Atrauli district Aligarh, India, under a major project 400 units of vermi-compost. He has also attended many National and International workshop and Conferences. He has also published two books on Engineering Mathematics. He has also published twelve research papers in various reputed international journals. His area of interest is Heat and Mass transfer, Mathematical Biology, Mathematical Modeling of Cancer and Tumor, Numerical Methods.
By Divesh Kumar Amit Sharma Surjan Singh
DOI: https://doi.org/10.5815/ijieeb.2017.01.02, Pub. Date: 8 Jan. 2017
Cloud computing acts as rising evolution in Information Technology (IT), boosting the delivery of services and eye-catching returns to its tenants enrolled at low costs of per usage basis. Cloud computing means “everywhere” and provides enormous available resources via internet with ensured quality. With the numerous profits involved, it clears the viewpoint of various businesses to invest in cloud services for accomplishment of their needs in the cloud habitat. Cloud enables computing resources in a service oriented flair instead of burden with lags in traditional setup of unified architecture. With delivery of cloud services occur many obstacles in the cloud to work securely without downfall in its performance. Security has always emerged as a long handed concern with its progression which affects its virtuous implementation. We commence with aspect of security based on parameters named Confidentiality (C), Integrity (I) and Granular Access (GA) and then sent over a secure channel via Secure File Transfer Protocol (SFTP) for secure storage with Elliptic Curve Cryptography (ECC) encryption laid on data. Secure Hash Algorithm (SHA) is used for hash value generation maintaining integrity. The authentication mechanism of secure Graphical One Time Password (GOTPass) provides high end to end security for retrieval process and boost security appliance for data. Data is divided into three security levels as per Secure Quality Index (SQI) generated and storage is isolated to have different security aspects. It provides supplemental controlled security and data protection as associated with the file. User is responsive to pass all security mechanisms to gain access.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals