User Data Control Protocol for Cloud Security

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy and Security of Big Data in THE Cloud

Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...

متن کامل

An efficient Access Control Protocol for cloud data security using Hyper Elliptic Curve Cryptography

One of the popular area in Information Technology (IT) is Cloud computing. It provides services such as Software as a Service (SaaS), Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) in on-demand basis. Clouds are capable of servicing millions of user requests. Due to huge amount of sensitive information are stored in cloud there is a need to authorize and authenticate users ...

متن کامل

Privacy and Security of Big Data in THE Cloud

Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...

متن کامل

Ensuring User Security and Data Integrity in Multi- Cloud

The most common method used for user security is textual passwords. But they are vulnerable to eves dropping, dictionary attack, shoulder surfing etc. To address this problem, text can be combined with colors to generate session passwords called hybrid textual authentication for authentication in multi – cloud. Provable data possession is a technique for ensuring data integrity. We present a co...

متن کامل

Enhanced Security Architecture for Cloud Data Security

Cloud computing offers a prominent service for data storage known as cloud storage. The flow and storage of data on the cloud environment in plain text format may be main security threat. So, it is the responsibility of cloud service providers to ensure privacy and security of data on storage as well as network level. The following three parameters confidentiality, integrity and availability de...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: HELIX

سال: 2019

ISSN: 2277-3495,2319-5592

DOI: 10.29042/2019-4763-4768