Cloud security: to prevent unauthorized access using an efficient key management authentication algorithm

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Efficient ID Based Security Algorithm for Mutual Node Authentication and Key Management: An Elliptic Curve Cryptography Based Approach

The biggest challenge in the field of networking is the secured communication between the nodes within the network system; therefore it has become one of the major and attractive fields of research in computer network. The importance of Elliptic Curve Cryptography (ECC) in this field is increasing rapidly because of its smaller key size compare to other known public-key algorithms. Several user...

متن کامل

An Authentication Mechanism to Enhance Security in the Cloud Environment

Cloud is a term defined as a pool of configurable computing resources that can be accessed by users based on a pay-asyou-go principle. Cloud computing is otherwise termed as internet computing because of its availability and that will be feasible only with the internet connection. Therefore, security plays a major role in cloud computing. Some of the important security services including encryp...

متن کامل

An efficient Access Control Protocol for cloud data security using Hyper Elliptic Curve Cryptography

One of the popular area in Information Technology (IT) is Cloud computing. It provides services such as Software as a Service (SaaS), Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) in on-demand basis. Clouds are capable of servicing millions of user requests. Due to huge amount of sensitive information are stored in cloud there is a need to authorize and authenticate users ...

متن کامل

Researches on Grid Security Authentication Algorithm in Cloud Computing

Focusing on multi-machine distributed computing security problems in cloud computing, the paper has proposed a grid distributed parallel authentication model based on trusted computing, which can realize simultaneous verification of grid authentication and grid behavior on upper layer of SSL and TLS protocols. Adaptive grid authentication method is established applying adaptive stream cipher fr...

متن کامل

A Comprehensive Cloud Security Model with Enhanced Key Management, Access Control and Data Anonymization Features

A disgusting problem in public cloud is to securely share data based on fine grained access control policies and unauthorized key management. Existing approaches to encrypt policies and data with different keys based on public key cryptosystem are Attribute Based Encryption and proxy reencryption. The weakness behind approaches is: It cannot efficiently handle policy changes and also problem in...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Engineering & Technology

سال: 2017

ISSN: 2227-524X

DOI: 10.14419/ijet.v7i1.1.10787