Rachna Jain
Banasthali Vidyapith
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Rachna Jain.
Bioscience, Biotechnology, and Biochemistry | 2013
Rachna Jain; Veena Garg; Koushalya Dangwal; Madhuri Kaushish Lily
The present study aimed at a comparative characterization of two distinct extracellular monocrotophos hydrolases, from Penicillium aculeatum ITCC 7980.10 (M3) and Fusarium pallidoroseum ITCC 7785.10 (M4), isolated from agricultural fields. The MCP hydrolases were purified by Sephadex G-100 column and DEAE-Sepharose CL-6B ion-exchange column followed by SDS–PAGE analysis, which showed the presence of two hydrolases, of 33 and 67 kDa respectively. Both enzymes were most active at alkaline pH and were stable over a wide range of temperatures (60–70 °C). Between the strains, the MCP hydrolases from M3 were 2-fold more active than that from M4. Enzyme kinetic studies showed lowest K m (33.52 mM) and highest V max (5.18 U/mg protein) for OPH67 of M3 in comparison to the K m and V max of the other hydrolases purified from M3 and M4, suggesting that M3 OPH67 was the most efficient MCP hydrolase. To the best of our knowledge, this is the first report of the purification of two distinct extracellular thermostable MCP hydrolases from fungal strains Penicillium aculeatum ITCC 7980.10 and Fusarium pallidoroseum ITCC 7785.10. Owing to its potential MCP hydrolyzing activity, M3 OPH67 can perhaps used directly or in the encapsulated form for remediation of MCP contaminated sites.
2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH) | 2016
Rachna Jain; Sushila Madan; Bindu Garg
Cloud computing technology offers so many luxuries like low cost, ease of accessibility of resources, high performance due to which it becomes a forthcoming revolution among organizations. Organisations are still very reluctant to store their data on cloud because it shifts the organizations data on cloud which is not trustworthy. There are different types of issues like Security, Protection, Identity Management, Management of resources, Management of Power and Energy, Data Isolation, Availability of resources and Heterogeneity of resources which has been observed in cloud computing environment that need to be addressed. According to survey conducted by IDC security was found to be most challenging issue which act as an obstruction in implementation of cloud computing. Cryptographic techniques that can be used as secure storage can help cloud computing at some extent but the major disadvantage of secure storage is that we cannot perform processing on encrypted data. So, in order to provide the security to the cloud network, homomorphic encryption technique can be used. In homomorphic encryption computations can be performed on cipher text and generate an encrypted result which will be same as result of operations performed on the plaintext when decrypted. This means in homomorphic encryption we can process the data without decryption. In this paper security issue is addressed in such a way that client will encrypt password with homomorphic encryption and then server performs equality testing on encrypted data in the form of encrypted array which will be decrypted by owners of data only.
CSI Transactions on ICT | 2016
Rachna Jain; Sushila Madan; Bindu Garg
Usually in cloud computing, all the administrations are being provided through internet. From past few years, we have observed that expanding favouritism of putting away and deploying data on the cloud. Saving privacy of individual information has been turned an essential and squeezing issue while offering privacy of individual information. In this paper a scheme that guarantees protection supportability along with sustainability in cloud environment is proposed. In this proposed work, information records are transferred by the client to the cloud by method for a secure key distribution which is consolidated by a key server and license server. We have also introduced an effective and efficient advanced digital rights management (DRM) scheme that permits client who owns the data to outsource the encrypted data file to a centralized content server. It also allows clients to access the data through a license issued by license server. Further, we have applied encryption principles to guarantee protection and security of transferred document or data. The proposed scheme prevents the attempts of malicious attacks made by an unauthorized user along with providing a secure key distribution.
Biodegradation | 2014
Rachna Jain; Veena Garg; Deepak Yadav
Applied Biochemistry and Biotechnology | 2013
Rachna Jain; Veena Garg
International Journal on Environmental Sciences | 2012
Rachna Jain; Veena Garg; K. P. Singh; Sheetal Gupta
international conference on computing for sustainable global development | 2016
Shubhi Mittal; Ashna Goel; Rachna Jain
Journal of Environmental and Occupational Science | 2015
Rachna Jain; Veena Garg
Applied Biochemistry and Biotechnology | 2015
Rachna Jain; Veena Garg; Jyoti Saxena
Turkish Journal of Biochemistry-turk Biyokimya Dergisi | 2013
Rachna Jain; Veena Garg; Koushalya Dangwal; Madhuri Kaushish Lily