Local cover image
Local cover image
Image from Google Jackets

Implementing Preserved Access of Cloud Networking

By: Contributor(s): Publication details: Tamil Nadu i-manager's 2017Edition: Vol.4(1), Jan-JuneDescription: 8-14pSubject(s): Online resources: In: i-manager's journal on cloud computing (JCC)Summary: Cloud computing is an emerging technology for providing Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Security-as-a-Service (SaaS), which offers reduced capital expenditure, maintenance, complexity and we require a new security mechanism for distributed computing and server client computing. In this scenario, the authors have proposed a “Preserved access for cloud networking” that supports anonymous authentication for security issues. In this scheme, cloud performs some verification procedure to validate the authenticity of user and also has an added feature of access control in which only valid user can able to decrypt the stored data and also prevent replay attacks. Also they have addressed another important feature called user revocation when any user performs malicious operations on stored data.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Status Barcode
Articles Abstract Database Articles Abstract Database School of Engineering & Technology Archieval Section Not for loan 2019895
Total holds: 0

Cloud computing is an emerging technology for providing Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Security-as-a-Service (SaaS), which offers reduced capital expenditure, maintenance, complexity and we require a new security mechanism for distributed computing and server client computing. In this scenario, the authors have proposed a “Preserved access for cloud networking” that supports anonymous authentication for security issues. In this scheme, cloud performs some verification procedure to validate the authenticity of user and also has an added feature of access control in which only valid user can able to decrypt the stored data and also prevent replay attacks. Also they have addressed another important feature called user revocation when any user performs malicious operations on stored data.

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

Local cover image
Share
Unique Visitors hit counter Total Page Views free counter
Implemented and Maintained by AIKTC-KRRC (Central Library).
For any Suggestions/Query Contact to library or Email: librarian@aiktc.ac.in | Ph:+91 22 27481247
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.