Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Saravanan, N.
- Steroidogenic Gene Expression in the Brain of an Indian Major Carp, Labeo rohita (HAM.)
Abstract Views :300 |
PDF Views:86
Authors
Affiliations
1 Endocrinology Unit, Department of Zoology, Madras Christian College, Tambaram, Chennai-600059, IN
1 Endocrinology Unit, Department of Zoology, Madras Christian College, Tambaram, Chennai-600059, IN
Source
Indian Journal of Science and Technology, Vol 4, No S8 (2011), Pagination: 47-48Abstract
No AbstractReferences
- Costa, E., Paul, S. (eds). 1991. Neurosteroids and brain function. Fidia Research Foundation symposium series. Thieme New York, Vol 8.
- Ebner, M.J., Corol, D.I., Havlikova, H., Honour, J.W., Fry, J.P. 2000. Identification of Neuroactive steroids and Their precursors and metabolites in adult male rat brain. Endocrinology, 147: 179-190.
- Kazuyoshi Tsutsui, 2006. Biosynthesis, mode of action and functional significance of neurosteroids in the developing Purkinje cell. J. Steroid Biochem. Mol. Biol. 102: 187–194.
- Expression of MIS Receptors in the Oocyte of Indian Major Carp, Cirrhinus mrigala
Abstract Views :320 |
PDF Views:83
Authors
Affiliations
1 Endocrinology Unit, Department of Zoology, Madras Christian College, Tambaram, Chennai-600 059, IN
1 Endocrinology Unit, Department of Zoology, Madras Christian College, Tambaram, Chennai-600 059, IN
Source
Indian Journal of Science and Technology, Vol 4, No S8 (2011), Pagination: 178-179Abstract
No AbstractReferences
- Kazeto.Y, Goto-Kazeto.R, Thomas P, Trant J, 2005. Molecular characterization of three forms of putative membrane –bound progestin receptors and their tissue distribution in channel catfish (Ictalurus punctatus). J. Mol. Endo., 34: 781-791
- Zhu, Y., Rice, C.D., Pang, Y., Pace, M., Thomas, P. 2003. Cloning, Expression and characterization of a membrane progestin receptor and evidence it is an intermediary in meiotic maturation of fish oocytes. Proc. Natl. Acad. Sci. USA, 100: 2231-2236
- A Survey on Secure Storage in Cloud Computing
Abstract Views :1009 |
PDF Views:243
Authors
A. Rajathi
1,
N. Saravanan
1
Affiliations
1 School of Computing , SASTRA University, 613401, Thanjavur, Tamilnadu, IN
1 School of Computing , SASTRA University, 613401, Thanjavur, Tamilnadu, IN
Source
Indian Journal of Science and Technology, Vol 6, No 4 (2013), Pagination: 4396-4401Abstract
Cloud Computing is an environment for providing information and resources that are delivered as a service to end-users over the Internet on demand. Thus cloud enables users to access their data from any geographical locations at any time and also has brought benefits in the form of online storage services. Cloud storage service avoids the cost expensive on software, personnel maintenance and provides better performance, less storage cost and scalability. But the maintenance of stored data in a secure manner is not an easy task in cloud environment and especially that stored data may not be completely trustworthy. Cloud delivers services through internet which increases their exposure to storage security vulnerabilities. However security is one of the major drawbacks that preventing several large organizations to enter into cloud computing environment. This work surveyed on several existing cloud storage frameworks, techniques and their advantages, drawbacks and also discusses the challenges that are required to implement secure cloud data storage. This survey results help to identify the future research areas and methods for improving the existing drawbacks.Keywords
Cloud Computing, Data, Security, Storage Techniques and SurveyReferences
- Parakh A, and Kak S (2009). Online data storage using implicit security, Information Sciences, vol 179(19), 3323-3331.
- Li H, Dai Y et al. (2009), Identity-Based Authentication for Cloud Computing, M. G. Jaatun, G. Zhao, and C. Rong (Eds.): Cloud Computing, Lecture Notes in Computer Science, vol 5931, 157-166.
- Wang Q, Wang C et al. (2011). Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing, IEEE Transactions on Parallel and Distributed Systems, vol 22(5), 847-859.
- Balakrishnan S, Saranya G, et al. (2011). Introducing Effective Third Party Auditing (TPA) for Data Storage Security in Cloud, International Journal of Computer Science and Technology, vol 2(2), 397-400.
- Dinesh C (2011). Data Integrity and Dynamic Storage Way in Cloud Computing, Distributed, Parallel, and Cluster Computing.
- Kumar S P, Subramanian R (2011). An efficient and secure protocol for ensuring data storage security in Cloud Computing, International Journal of Computer Science Issues, vol 8(6), No 1, 261-274.
- Sajithabanu S, Raj E G P (2011). Data Storage Security in Cloud, International Journal of Computer Science and Technology, vol 2(4), 436-440
- Wang C, Wang Q et al. (2012), Toward Secure and Dependable Storage Services in Cloud Computing, IEEE Transactions on Services Computing, vol 5(2), 220-232.
- Spillner J, Müller J et al. (2012), Creating optimal cloud storage systems, Future Generation Computer Systems, vol 29(4), 1062-1072.
- Dong B, Zheng Q et al. (2012). An optimized approach for storing and accessing small files on cloud storage, Journal of Network and Computer Applications, 35 (6), 1847-1862.
- Deshmukh P M, Gughane A S et al. (2012). Maintaining File Storage Security in Cloud Computing, International Journal of Emerging Technology and Advanced Engineering, vol 2(10), 2250-2459.
- Tang Y, Lee P P C et al (2010). FADE: a secure overlay cloud storage system with File Assured Deletion, 6th International ICST Conference, Secure Comm.
- Wang W, Li Z et al. (2009). Secure and Efficient Access to Outsourced Data, CCSW ‘09 Proceedings of the 2009 ACM workshop on Cloud computing security, 55-66.
- Privacy Preserving Approaches in Cloud: a Survey
Abstract Views :731 |
PDF Views:0
Authors
Affiliations
1 School of Computing, SASTRA University, Thanjavur, 613401, Tamilnadu, IN
1 School of Computing, SASTRA University, Thanjavur, 613401, Tamilnadu, IN
Source
Indian Journal of Science and Technology, Vol 6, No 5 (2013), Pagination: 4531-4535Abstract
Cloud Computing is continuously evolving and showing consistent growth in the field of computing. But, the security issues and threats associated with it still stay as a cumbersome. The focal point of this paper is Privacy preserving in cloud computing. This paper analyses and discusses various methods like adopting cryptographic methods, writing access rights and policies, anonymising data, segregating or fragmenting and then reconstructing the data, etc. All these approaches would preserve the privacy of user and data and while performing public auditing on the cloud data. The surveyed approaches are showcased and compared with one another, stating their pros and cons. Finally, the results are centralized and the issues to be concentrated in the future are drawn out. Enabling complete user control over his data, anonymising or encrypting the sensitive data before outsourcing, notifying the data owner upon data access, altogether with the tied up security mechanisms would nullify the privacy issue. This would serve as a helping note in the progress of strengthening the privacy preserving approaches in Cloud Computing.Keywords
Cloud Computing, Privacy Preserving, Access Control, Public AuditingReferences
- Wang J, Zhao Y et al. (2009). Providing Privacy Preserving in cloud computing, International Conference on Test and Measurement, vol 2, 213-216.
- Greveler U, Justus b et al. (2011). A Privacy Preserving System for Cloud Computing, 11th IEEE International Conference on Computer and Information Technology, 648-653.
- Zhou M, Mu Y et al. (2011). Privacy-Preserved Access Control for Cloud Computing, International Joint Conference of IEEE TrustCom-11/IEEE ICESS-11/FCST-11, 83-90.
- Chadwick D W, and Fatema K (2012). A privacy preserving authorisation system for the cloud, Journal of Computer and System Sciences, vol 78(5), 1359-1373.
- Sayi T J V R K M K, Krishna R K N S et al. (2012). Data Outsourcing in Cloud Environments: A Privacy Preserving Approach, 9th International Conference on Information Technology- New Generations, 361-366.
- Rahaman S M, and Farhatullah M (2012). PccP: A Model for Preserving Cloud Computing Privacy, International Conference on Data Science & Engineering (ICDSE), 166-170.
- Waqar A, Raza A et al. (2013). A framework for preservation of cloud users’ data privacy using dynamic reconstruction of metadata, Journal of Network and Computer Applications, vol 36(1), 235-248.
- Wang C, Wang Q et al. (2010). Privacy-Preserving Public Auditing for Storage Security in Cloud Computing, Proceedings IEEE INFOCOM’10.
- Wang C, Chow S S M et al. (2013). Privacy-Preserving Public Auditing for Secure Cloud Storage, IEEE Transactions on Computers, vol 62(2), 362-375.
- Wang B, Li B et al. (2012). Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud, IEEE Fifth International Conference on Cloud Computing, 295-302.
- Gellman R (2009). WPF REPORT: Privacy in the clouds: Risks to privacy and confidentiality from cloud computing.
- Rong C, Nguyen S T et al. (2013). Beyond lightning: A survey on security challenges in cloud computing , Computers & Electrical Engineering, vol 39(1), 47-54.
- Takabi H (2010). Security and Privacy Challenges in Cloud Computing Environments, IEEE Security & Privacy, vol 8(6), 24-31.
- Xiao Z, and Xiao Y. Security and Privacy in Cloud Computing, IEEE Communications Surveys & Tutorials, vol PP(99), 1-17.
- Synthesis of Neurosteroids and its Sexual Dimorphism in the Brain of Tilapia Oreochromis Mossambicus
Abstract Views :227 |
PDF Views:0
Authors
Affiliations
1 Endocrinology Unit, Department of Zoology, Madras Christian College, Tambaram, Chennai 600059, Tamil Nadu, IN
2 Endocrinology Unit, Department of Zoology, Madras Christian College, Tambaram, Chennai 600059, Tamil Nadu
1 Endocrinology Unit, Department of Zoology, Madras Christian College, Tambaram, Chennai 600059, Tamil Nadu, IN
2 Endocrinology Unit, Department of Zoology, Madras Christian College, Tambaram, Chennai 600059, Tamil Nadu