Loading

Privacy Preserving Approach for Preventing from Access to Unauthorized Users
Anuradha Padala1, Yarramalle Srinivas2, M. H. M. Krishna Prasad3
1Padala Anuradha, Department of Computer Science Engineering, GITAM (Deemed to be University), Visakhapatnam, India.
2Yarramalle Srinivas, Department of Information Technology, GITAM (Deemed to be University), Visakhapatnam, India.
3M.H.M Krishna Prasad, Department of Computer Science Engineering, JNT University, Kakinada, India.

Manuscript received on 02 June 2019 | Revised Manuscript received on 10 June 2019 | Manuscript published on 30 June 2019 | PP: 3051-3058 | Volume-8 Issue-8, June 2019 | Retrieval Number: H7066068819/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Today with the usage of sophisticated systems, most of the people are relying in transmitting the data using high speed internet technologies. However, it is resulting into a challenging issue with respect to both storage and transmission because of security features and intelligent unethical persons, it needs to protect the data. The present article highlights a system model which aims at preserving the data within the organizations from unethical persons.
Keyword: Privacy Preservation, Storage, Transmission, unethical, GMM.
Scope of the Article: Wireless Power Transmission.