Currently cloud computing environments have come up with a serious problem known as security which is in terms of Confidentiality of Data, Integrity of the Message and Authenticity of the users (CIA). Since user's personal data is being stored in an unencrypted format on a remote machine operated by third party vendors who provide various services, the impact of user's identity and unauthorized access or disclosure of files are very high. Though we have various techniques and algorithms to protect our data from hackers and intruders still cloud environments are prone to other attacks. In this book, a novel approach is implemented to protect user's confidential data from third party service providers, and also to make sure that the data is not disclosed to any unauthentic user or the service provider even, in any cloud environments. This approach provides a multi-level security in three aspects: 1) User authentication for 'authorization' to enter the network, 2) Image Sequencing password for 'authentication' wherein it is proved that the identity is original user and 3) RSA algorithm to encrypt the data further for providing 'data integrity'. Thus this approach provides an overall security to the client's personal data and the major issue of confidentiality, integrity and authenticity is fully solved. Implemented results are represented to illustrate that our approach has a reasonable performance.
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
Ashwin Dhivakar M R, Currently a Research Fellow in the Department of Computer and System Sciences at Jaipur National University, Rajasthan, India. He has authored few papers with IEEE publications and other International Journals as well on Grid and Cloud Computing technologies. His major research area includes security and Image Processing. He is a member of Computer Society of India and Association of Computer Engineers, India. He holds a M.Tech in Computer Science and Engineering from Lovely Professional University, Punjab and a Bachelor of Engineering in Computer Science and Engineering from Karunya University, Tamil Nadu, India.
Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
Etat : New. N° de réf. du vendeur 21729783-n
Quantité disponible : 1 disponible(s)
Vendeur : PBShop.store US, Wood Dale, IL, Etats-Unis
PAP. Etat : New. New Book. Shipped from UK. Established seller since 2000. N° de réf. du vendeur DB-9783954893119
Quantité disponible : 1 disponible(s)
Vendeur : PBShop.store UK, Fairford, GLOS, Royaume-Uni
PAP. Etat : New. New Book. Shipped from UK. Established seller since 2000. N° de réf. du vendeur DB-9783954893119
Quantité disponible : 1 disponible(s)
Vendeur : GreatBookPricesUK, Woodford Green, Royaume-Uni
Etat : New. N° de réf. du vendeur 21729783-n
Quantité disponible : 1 disponible(s)
Vendeur : Revaluation Books, Exeter, Royaume-Uni
Paperback. Etat : Brand New. 44 pages. 8.27x5.83x0.11 inches. In Stock. This item is printed on demand. N° de réf. du vendeur __3954893118
Quantité disponible : 1 disponible(s)
Vendeur : Rheinberg-Buch Andreas Meier eK, Bergisch Gladbach, Allemagne
Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Currently cloud computing environments have come up with a serious problem known as security which is in terms of Confidentiality of Data, Integrity of the Message and Authenticity of the users (CIA). Since user s personal data is being stored in an unencrypted format on a remote machine operated by third party vendors who provide various services, the impact of user s identity and unauthorized access or disclosure of files are very high. Though we have various techniques and algorithms to protect our data from hackers and intruders still cloud environments are prone to other attacks. In this book, a novel approach is implemented to protect user s confidential data from third party service providers, and also to make sure that the data is not disclosed to any unauthentic user or the service provider even, in any cloud environments. This approach provides a multi-level security in three aspects: 1) User authentication for authorization to enter the network, 2) Image Sequencing password for authentication wherein it is proved that the identity is original user and 3) RSA algorithm to encrypt the data further for providing data integrity . Thus this approach provides an overall security to the client s personal data and the major issue of confidentiality, integrity and authenticity is fully solved. Implemented results are represented to illustrate that our approach has a reasonable performance. 44 pp. Englisch. N° de réf. du vendeur 9783954893119
Quantité disponible : 1 disponible(s)
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Currently cloud computing environments have come up with a serious problem known as security which is in terms of Confidentiality of Data, Integrity of the Message and Authenticity of the users (CIA). Since user s personal data is being stored in an unencrypted format on a remote machine operated by third party vendors who provide various services, the impact of user s identity and unauthorized access or disclosure of files are very high. Though we have various techniques and algorithms to protect our data from hackers and intruders still cloud environments are prone to other attacks. In this book, a novel approach is implemented to protect user s confidential data from third party service providers, and also to make sure that the data is not disclosed to any unauthentic user or the service provider even, in any cloud environments. This approach provides a multi-level security in three aspects: 1) User authentication for authorization to enter the network, 2) Image Sequencing password for authentication wherein it is proved that the identity is original user and 3) RSA algorithm to encrypt the data further for providing data integrity . Thus this approach provides an overall security to the client s personal data and the major issue of confidentiality, integrity and authenticity is fully solved. Implemented results are represented to illustrate that our approach has a reasonable performance. 44 pp. Englisch. N° de réf. du vendeur 9783954893119
Quantité disponible : 1 disponible(s)
Vendeur : Ria Christie Collections, Uxbridge, Royaume-Uni
Etat : New. In. N° de réf. du vendeur ria9783954893119_new
Quantité disponible : Plus de 20 disponibles
Vendeur : Wegmann1855, Zwiesel, Allemagne
Taschenbuch. Etat : Neu. Neuware -Currently cloud computing environments have come up with a serious problem known as security which is in terms of Confidentiality of Data, Integrity of the Message and Authenticity of the users (CIA). Since user¿s personal data is being stored in an unencrypted format on a remote machine operated by third party vendors who provide various services, the impact of user¿s identity and unauthorized access or disclosure of files are very high. Though we have various techniques and algorithms to protect our data from hackers and intruders still cloud environments are prone to other attacks. In this book, a novel approach is implemented to protect user¿s confidential data from third party service providers, and also to make sure that the data is not disclosed to any unauthentic user or the service provider even, in any cloud environments. This approach provides a multi-level security in three aspects: 1) User authentication for ¿authorization¿ to enter the network, 2) Image Sequencing password for ¿authentication¿ wherein it is proved that the identity is original user and 3) RSA algorithm to encrypt the data further for providing ¿data integrity¿. Thus this approach provides an overall security to the client¿s personal data and the major issue of confidentiality, integrity and authenticity is fully solved. Implemented results are represented to illustrate that our approach has a reasonable performance. N° de réf. du vendeur 9783954893119
Quantité disponible : 1 disponible(s)
Vendeur : Majestic Books, Hounslow, Royaume-Uni
Etat : New. Print on Demand pp. 44 24:B&W 5.83 x 8.27 in or 210 x 148 mm (A5) Perfect Bound on Creme w/Gloss Lam. N° de réf. du vendeur 356104427
Quantité disponible : 4 disponible(s)