Cryptography is the technique for hiding data and information from unauthorized users. It is the art of achieving security by encoding messages to make them non-readable. When we send simple message from one location to another then this message called plain text is visible to anybody. If we want to codify the message called cipher text so that no one can easily understand the meaning of message then we use cryptography techniques. There are numerous applications where this technology is used such as ATM pin, Password, Credit Card number or any other secret communication. Cryptography can be divided into following three categories depending upon the types of key used: secret key (symmetric) cryptography, public key (asymmetric) cryptography and hash functions. In this paper we provide review of various types of cryptography techniques.
This paper focuses on the job scheduling in cloud environment. Here the task has been scheduled in cloud and fog. Cloud provides services to heavy application while fog provides service to lighter application. The job scheduler would be helpful to reduce burden of cloud and help in energy optimization. The jobs are scheduled according to their types and priority. Various job scheduling algorithm such as gang scheduling, FCFS and round robin mechanism have been discussed in this research for load balancing and improve the compilation time. The simulation has been made using Matlab on virtual machines.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.