30,09 €
To implement a Multi-level Security in Cloud Computing using Cryptography Novel Approach
To implement a Multi-level Security in Cloud Computing using Cryptography Novel Approach
  • Sold out
To implement a Multi-level Security in Cloud Computing using Cryptography Novel Approach
To implement a Multi-level Security in Cloud Computing using Cryptography Novel Approach
El. knyga:
30,09 €
Master's Thesis from the year 2014 in the subject Computer Science - IT-Security, Lovely Professional University, Punjab, course: M.Tech (Computer Science and Engineering), language: English, abstract: Currently cloud computing environments have come up with a serious problem known as security which is in terms of Confidentiality of Data, Integrity of the Message and Authenticity of the users (CIA). Since user's personal data is being stored in an unencrypted format on a remote machine operated…
  • Publisher:
  • Year: 2014
  • Pages: 44
  • ISBN: 9783656652021
  • ISBN-10: 3656652023
  • ISBN-13: 9783656652021
  • Format: PDF
  • Language: English

To implement a Multi-level Security in Cloud Computing using Cryptography Novel Approach (e-book) (used book) | bookbook.eu

Reviews

Description

Master's Thesis from the year 2014 in the subject Computer Science - IT-Security, Lovely Professional University, Punjab, course: M.Tech (Computer Science and Engineering), language: English, abstract: Currently cloud computing environments have come up with a serious problem known as security which is in terms of Confidentiality of Data, Integrity of the Message and Authenticity of the users (CIA). Since user's personal data is being stored in an unencrypted format on a remote machine operated by third party vendors who provide various services, the impact of user's identity and unauthorized access or disclosure of files are very high. Though we have various techniques and algorithms to protect our data from hackers and intruders still cloud environments are prone to other attacks. In this paper, a novel approach is implemented to protect user's confidential data from third party service providers, and also to make sure that the data is not disclosed to any unauthentic user or the service provider even, in any cloud environments. This approach provides a multi-level security in three aspects: 1) User authentication for "authorization" to enter the network, 2) Image Sequencing password for "authentication" wherein it is proved that the identity is original user, and 3) RSA algorithm to encrypt the data further for providing "data integrity". Thus this approach provides an overall security to the client's personal data and the major issue of confidentiality, integrity and authenticity is fully solved. Implemented results are represented to illustrate that our approach has a reasonable performance.

30,09 €
Log in and for this item
you will receive
0,30 Book Euros! ?

Electronic book:
Delivery after ordering is instant! Intended for reading only on a computer, tablet or other electronic device.

Lowest price in 30 days: 30,09 €

Lowest price recorded: Price has not changed

  • Author: Ashwin Dhivakar
  • Publisher:
  • Year: 2014
  • Pages: 44
  • ISBN: 9783656652021
  • ISBN-10: 3656652023
  • ISBN-13: 9783656652021
  • Format: PDF
  • Language: English English

Master's Thesis from the year 2014 in the subject Computer Science - IT-Security, Lovely Professional University, Punjab, course: M.Tech (Computer Science and Engineering), language: English, abstract: Currently cloud computing environments have come up with a serious problem known as security which is in terms of Confidentiality of Data, Integrity of the Message and Authenticity of the users (CIA). Since user's personal data is being stored in an unencrypted format on a remote machine operated by third party vendors who provide various services, the impact of user's identity and unauthorized access or disclosure of files are very high. Though we have various techniques and algorithms to protect our data from hackers and intruders still cloud environments are prone to other attacks. In this paper, a novel approach is implemented to protect user's confidential data from third party service providers, and also to make sure that the data is not disclosed to any unauthentic user or the service provider even, in any cloud environments. This approach provides a multi-level security in three aspects: 1) User authentication for "authorization" to enter the network, 2) Image Sequencing password for "authentication" wherein it is proved that the identity is original user, and 3) RSA algorithm to encrypt the data further for providing "data integrity". Thus this approach provides an overall security to the client's personal data and the major issue of confidentiality, integrity and authenticity is fully solved. Implemented results are represented to illustrate that our approach has a reasonable performance.

Reviews

  • No reviews
0 customers have rated this item.
5
0%
4
0%
3
0%
2
0%
1
0%
(will not be displayed)