A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing security architecture
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2012, Vol 3, Issue 10
Abstract
The cloud computing platform gives people the opportunity for sharing resources, services and information among the people of the whole world. In private cloud system, information is shared among the persons who are in that cloud. For this, security or personal information hiding process hampers. In this paper we have proposed new security architecture for cloud computing platform. This ensures secure communication system and hiding information from others. AES based file encryption system and asynchronous key system for exchanging information or data is included in this model. This structure can be easily applied with main cloud computing features, e.g. PaaS, SaaS and IaaS. This model also includes onetime password system for user authentication process. Our work mainly deals with the security system of the whole cloud computing platform.
Authors and Affiliations
Kawser Nafi, Tonny Kar, Sayed Hoque, Dr. M. Hashem
Anonymized Social Networks Community Preservation
Social Networks have been widely used in the society. Most of the people are connected to one another, communicated with each other and share the information in different forms. The information gathered from different so...
The Phenomenon of Enterprise Systems in Higher Education:Insights From Users
Higher education has been strongly influenced by global trends to adopt new technologies. There has been a call by governments for universities worldwide to improve their performance and efficiency. In response, higher e...
Confinement for Active Objects
In this paper, we provide a formal framework for the security of distributed active objects. Active objects com-municate asynchronously implementing method calls via futures. We base the formal framework on a security mo...
A Novel Rule-Based Root Extraction Algorithm for Arabic Language
Non-vocalized Arabic words are ambiguous words, because non-vocalized words may have different meanings. Therefore, these words may have more than one root. Many Arabic root extraction algorithms have been conducted to e...
An Incident Management System for Debt Collection in Virtual Banking
An astonishing peak volume of bad loans in most countries, including Iran, is one of the latest manifestations of deep disorders which inhibited banking system from performing its main duty to promote development plans o...