Abstract:This system proposed an improve data security protection mechanism for cloud using two components. In this system sender sends an encrypted message to a receiver with the help of cloud system. The sender requires to know identity of receiver but no need of other information such as certificate or public key. To decrypt the cipher text, receiver needs two parts. The first thing is a unique personal security device or some hardware device connected to the computer system. Second one is private key or secrete key stored in the computer. Without having these two things cipher text never decrypted. The important thing is the security device lost or stolen, then cipher text cannot be decrypted and hardware device is revoked or cancelled to decrypt cipher text.
5G technology is a revolutionary technology in the field of wireless telecommunications implementing the latest networking architecture which provides high quality services. In this paper, an attempt is made to review the existing generations of mobile wireless technology, their evolution and compare them in terms of their features and performances. Efforts are made to shed light on the architecture proposed by far for the implementation of a 5G network. The term 5G is used alternatingly with World Wide Wireless Web (WWWW), which as a platform enables us to connect to any kind of devices, anytime, anywhere.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.