buchspektrum Internet-Buchhandlung

Neuerscheinungen 2014

Stand: 2020-02-01
Schnellsuche
ISBN/Stichwort/Autor
Herderstraße 10
10625 Berlin
Tel.: 030 315 714 16
Fax 030 315 714 14
info@buchspektrum.de

Ashwin Dhivakar

A multi-level security in Cloud Computing: Image Sequencing and RSA algorithm


Erstauflage. 2014. 40 S. 235 mm
Verlag/Jahr: ANCHOR ACADEMIC PUBLISHING 2014
ISBN: 3-9548931-1-8 (3954893118)
Neue ISBN: 978-3-9548931-1-9 (9783954893119)

Preis und Lieferzeit: Bitte klicken


Currently cloud computing environments have come up with a serious problem known as security which is in terms of Confidentiality of Data, Integrity of the Message and Authenticity of the users (CIA). Since user s personal data is being stored in an unencrypted format on a remote machine operated by third party vendors who provide various services, the impact of user s identity and unauthorized access or disclosure of files are very high. Though we have various techniques and algorithms to protect our data from hackers and intruders still cloud environments are prone to other attacks. In this book, a novel approach is implemented to protect user s confidential data from third party service providers, and also to make sure that the data is not disclosed to any unauthentic user or the service provider even, in any cloud environments. This approach provides a multi-level security in three aspects: 1) User authentication for authorization to enter the network, 2) Image Sequencing password for authentication wherein it is proved that the identity is original user and 3) RSA algorithm to encrypt the data further for providing data integrity . Thus this approach provides an overall security to the client s personal data and the major issue of confidentiality, integrity and authenticity is fully solved. Implemented results are represented to illustrate that our approach has a reasonable performance.
Text Sample:
Chapter 1.2, History of Cloud Computing:
In 1950, the cloud computing concept came into picture. Here, the large scale mainframe computers are used in many corporations and these computers are accessible by the terminal computers. Time sharing is the process of sharing CPU time on a mainframe system.
In 1960-1990, the present day scenario of the cloud computing, square measure explored by politician Parkhill, he described The Challenge of the PC Utility . An agency Corporation was found in 1957. The Tymshare was found in 1966, National CSS was found in 1967 and acquired by Dun & poet in 1979, Dial information bought by Tymshare in 1968, and Bolt, Beranek and Newman BBN marketed time-sharing as a billboard venture.
In 1990, telecommunications companies begin to offer virtual private network (VPN) services with good quality of service on a less price by switching traffic which suits a balanced server use; wherein bandwidth was efficiently used. They started using the cloud representation to indicate the segregation point. Network infrastructure and servers were bounded through cloud computing.
In 2000, following the dot-com bubble, modernization of information centres were done by Amazon that was important within the evolution of cloud computing. A product was launched for external customers and Amazon net Services (AWS) for computing supported utility in 2006. In 2008, Eucalyptus was the first open supply, AWS API-compatible platform for deploying personal clouds. In early 2008, Open Nebula was the first ASCII text file software package for deploying personal and hybrid clouds. On March 1, 2011, IBM declared the IBM sensible Cloud framework to support Smarter Planet. Amidst a variety of parts for Smarter Computing foundation, cloud computing could be an essential piece. On June 7, 2012, Oracle declared the Oracle Cloud. Despite the very fact that Oracle Cloud square measure still below improvement, this cloud is taken into account to be the first to supply users through access to AN integrated set of IT solutions, like Applications (SaaS), Platform (PaaS), and Infrastructure (IaaS) layers.