In the era of cloud computing, datasecurity and privacy is one of the concerns when enterprises adopt cloud based applications. There have been a few practical encryption based solutions in the industry. This talk wi...
详细信息
In the era of cloud computing, datasecurity and privacy is one of the concerns when enterprises adopt cloud based applications. There have been a few practical encryption based solutions in the industry. This talk will discuss some technologies in this domain such as CASB,cloud Encryption Gateway, and cloud DLP. Those products or services are ad-hoc in nature. In long term, general cloudsecurity technologies such as FHE(fully homomorphic encryption) or MPC(multi-party computation) should be implemented when they become practical.
datasecurity is the major problem in cloud computing. To overcome this problem in the existing work Password can be used as a key to encrypt and decrypt the data in cloud environment. Some of the limitations having P...
详细信息
datasecurity is the major problem in cloud computing. To overcome this problem in the existing work Password can be used as a key to encrypt and decrypt the data in cloud environment. Some of the limitations having Password system because it is not secured, and easily forgotten. In order to overcome these problems the proposed technique utilizes effective data storage using biometric-based authentication to support the user authentication for the cloud environment. For user authentication here we are considering iris and fingerprint. Initially the feature values are extracted from the iris and fingerprint using local binary pattern. In order to improve the security Extracting the feature value of fingerprint and iris and it is given input to the hybrid Genetic Algorithm and Particle swarm optimization algorithm to find the best solution using Cross over mutation technique. Best solution value can be act as a key for encrypting and decrypting data using Triple data Encryption Standard Algorithm. Finally encrypted data can be stored in cloud using cloud simulator in the Working platform of net beans in java. Finally randomly tested with 5 fingerprint and 5 Iris image for the purpose of man in the middle attack. After tested with fingerprint and iris proposed Hybrid Genetic algorithm with Particle swarm optimization algorithm having less attack compared with the existing Particle swarm optimization algorithm. So the intruder cannot be able to access the data in cloud environment.
cloud computing exhibit itself a rising innovation in IT world, which provides a new diagram of activity that empowers organizations to use virtual products, applications and equipment assets with no in any up-front i...
详细信息
ISBN:
(纸本)9781538691885
cloud computing exhibit itself a rising innovation in IT world, which provides a new diagram of activity that empowers organizations to use virtual products, applications and equipment assets with no in any up-front investment. Few years later with the great advancements in cloud computing and vast enhancement of portable programs, further evolution is being expected in the form of cloud Computing integration with mobile devices which gave birth to Mobile cloud Computing (MCC). Mobile cloud computing is obtaining the prominence of the among user of mobile device. it supplies a platform where transportable device users employ cloud services on transportable devices. The exploit of MCC minimizes the performance, compatibility and lack of resource issues in transportable device environment. Despite the hype of transportable cloud computing, the growth of movable cloud regular customers remained lesser than anticipations because of the risks related with security and confidentiality. These risks play a significant role in preventing organizations from adopting the MCC environment. Major research is underway to reduce security issues, but much work remains to be done for create a secure MCC environment. This document represents a comprehensive review of MCC security issues and challenges
暂无评论