Mchf Algorithm for Multilevel Cloud Security
نویسندگان
چکیده
منابع مشابه
Enhancing Security in Cloud Computing Using Multilevel Authentication
The proposed work aims to enhance authorization and authentication process by using multilevel authentication to protect cloud from malicious user and unauthorized access, implement security measure to protect data of users stored in cloud environment. It will also provide service level security. Also user based access control is applied over user's data so that user can grant, revoke sharing p...
متن کاملAn Adaptive Multilevel Security Framework for the Data Stored in Cloud Environment
Cloud computing is renowned for delivering information technology services based on internet. Nowadays, organizations are interested in moving their massive data and computations into cloud to reap their significant benefits of on demand service, resource pooling, and rapid elasticity that helps to satisfy the dynamically changing infrastructure demand without the burden of owning, managing, an...
متن کاملEnhanced Security Architecture for Cloud Data Security
Cloud computing offers a prominent service for data storage known as cloud storage. The flow and storage of data on the cloud environment in plain text format may be main security threat. So, it is the responsibility of cloud service providers to ensure privacy and security of data on storage as well as network level. The following three parameters confidentiality, integrity and availability de...
متن کاملMultilevel Adaptive Security System
MULTILEVEL ADAPTIVE SECURITY SYSTEM by Hongwei Li Recent trends show increased demand for content-rich media such as images, videos and text in ad-hoc communication. Since such content often tends to be private, sensitive, or paid for, there exists a requirement for securing such information over resource constrained ad hoc networks. In this work, traditional data security mechanisms, existing ...
متن کاملMultilevel Security Policies
So to define MLS policy, it is necessary to first specify a set of security levels. This set of security levels is associated with a partial order relation denoted <. If l1 and l2 are two security levels then l1 < l2 is read l1 is lower than l2. When < is a partial order relation, it may happen that both l1 < l2 and l2 < l1 and l1 = l2 are false. In this case, we say that l1 and l2 are incompar...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IOSR Journal of Engineering
سال: 2014
ISSN: 2278-8719,2250-3021
DOI: 10.9790/3021-04433953