Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
0Activity
0 of .
Results for:
No results containing your search query
P. 1
Secure Authentication of Cloud Data Mining API

Secure Authentication of Cloud Data Mining API

Ratings: (0)|Views: 5|Likes:
Published by Rohit Bhadauria
Cloud computing is a revolutionary concept that
has brought a paradigm shift in the IT world.
This
has made
it possible to manage and run businesses without even setting
up an IT infrastructure. It offers multifold benefits to the
users moving to a cloud, while posing unknown security and
privacy issues. User authentication is one such growing
concern a
nd is greatly needed in order to ensure privacy and
security in a cloud computing environment. This paper
discusses the security at different levels viz. network,
application and virtualization, in a cloud computing
environment. A security framework based
on one
-
time pass
key mechanism has been proposed. The uniqueness of the
proposed security protocol lies in the fact, that it provides
security to both the service providers as well the users in a
highly conflicting cloud environment
.
Cloud computing is a revolutionary concept that
has brought a paradigm shift in the IT world.
This
has made
it possible to manage and run businesses without even setting
up an IT infrastructure. It offers multifold benefits to the
users moving to a cloud, while posing unknown security and
privacy issues. User authentication is one such growing
concern a
nd is greatly needed in order to ensure privacy and
security in a cloud computing environment. This paper
discusses the security at different levels viz. network,
application and virtualization, in a cloud computing
environment. A security framework based
on one
-
time pass
key mechanism has been proposed. The uniqueness of the
proposed security protocol lies in the fact, that it provides
security to both the service providers as well the users in a
highly conflicting cloud environment
.

More info:

Categories:Topics
Published by: Rohit Bhadauria on Aug 30, 2013
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

08/30/2013

pdf

text

original

You're Reading a Free Preview
Pages 2 to 7 are not shown in this preview.

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->