Implementing Preserved Access of Cloud Networking
By: Kaki Leela Prasad.
Contributor(s): Pilaka, Anusha.
Publisher: Tamil Nadu i-manager's 2017Edition: Vol.4(1), Jan-June.Description: 8-14p.Subject(s): Computer EngineeringOnline resources: Click here In: i-manager's journal on cloud computing (JCC)Summary: Cloud computing is an emerging technology for providing Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Security-as-a-Service (SaaS), which offers reduced capital expenditure, maintenance, complexity and we require a new security mechanism for distributed computing and server client computing. In this scenario, the authors have proposed a “Preserved access for cloud networking” that supports anonymous authentication for security issues. In this scheme, cloud performs some verification procedure to validate the authenticity of user and also has an added feature of access control in which only valid user can able to decrypt the stored data and also prevent replay attacks. Also they have addressed another important feature called user revocation when any user performs malicious operations on stored data.Item type | Current location | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|
Articles Abstract Database | School of Engineering & Technology Archieval Section | Not for loan | 2019895 |
Cloud computing is an emerging technology for providing Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Security-as-a-Service (SaaS), which offers reduced capital expenditure, maintenance, complexity and we require a new security mechanism for distributed computing and server client computing. In this scenario, the authors have proposed a “Preserved access for cloud networking” that supports anonymous authentication for security issues. In this scheme, cloud performs some verification procedure to validate the authenticity of user and also has an added feature of access control in which only valid user can able to decrypt the stored data and also prevent replay attacks. Also they have addressed another important feature called user revocation when any user performs malicious operations on stored data.
There are no comments for this item.