Online ISSN: 2515-8260

Keywords : authentication


Rajesh Dhakane; Arati Deshpande; Anant Shinde; Vijay Upadhye; Gayatri Tingre; Pramod Ghogare; Amol Adhao; Mahesh Chavdar; Ganesh Nikalje; Anil Jogdand

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 11, Pages 8153-8172

Non vegetarian food has expanded market in the world, especially, in those areas where
vegetarian foods are available in less quantity. Meat and meat products (cow beef) are
obtained by slaughtering animals including cattle. However, the origin of animal species in
food links with religious ethics, which are violated by sellers for commercial gain including
mismatch in labelling and ingredients and presence of trace amount of restricted animal
meat in daily used meat foods. Hence, authentication of the meat based foods comes in role
that protects ethics and animal protection. In this review, we have investigated the
authentication status of meat (cow beef) based food products using globally used COI gene
dependent DNA barcoding technology.

VM based Shared Resource Protecting in Cloud Environment

Subbiah Swaminathan; Gnanavel R; Duraimurugan N

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 4, Pages 1846-1850

Cloud computing is the prevalent change occurring in the area of data innovation. At present a significant concern in cloud appropriation is towards its security and protection. In the progression of distributed computing the application part of virtualization in the long run builds, the extent of the security and protection steadily extends. The clients profit from cloud innovation for two main considerations that are Data protection and security. Cloud security conveys all the administrations dependent on clients need-firewalls, URL channels, sandboxes, SSL assessment, antivirus and remaining in a unified platform. It is an airtight security without the expense and multifaceted nature of apparatuses which shuts the security holes made by BYOD and portability. Despite the fact that distributed computing gives security there are some backlogs. The cloud security is hazards due to absence of information excess and consistency. Here, it represents the calculation of security by utilizing SRP convention which is a solid confirmation protocol (one-time guess per association endeavour) that oppose all well-known dynamic and detached assault over the system.