Cloud Computing Security With Two-Level Mechanism

Abstract

The recent success of cloud services and its ever increasing popularity are not unknown to anyone and neither are the security threats which persist in parallel with its growth. Countermeasures have been introduced to minimize the threats; still the security breaches are always at large. It has been observed from the previous studies that emphasis has been given largely on security of Cloud services; still solutions are far from expected. We present a solution which can be used to generate higher level of security to the Clients as well as an encryption technique to further improvise the existing structure of Cloud Computing.

Authors and Affiliations

H. V. Taiwade

Keywords

Related Articles

Lifetime Enhancement of Wireless Sensor Networks Through Overhead Reduction

Wireless Sensor Networks (WSNs) can provide low cost solutions to various real world problems. WSNs consist of spatially dispersed autonomous sensors to monitor physical or environmental condition, such as sound, tem...

Human Gait Based Gender Classification Using Various Transformation Techniques

Gender classification such as classifying human face is only challenging for computer, but even hard for human in some cases. In our work a new novel approach is proposed to recognize gender from the face image. Cont...

Securing SMS-based approach for two factor authentication

Nowadays most of the institution faces a huge problem related to security. Most of the institution uses the traditional way to provide authentication. That means most them are use passwords as an authentication mechan...

Storage Correctness Verification and Data Regaining In Cloud

Users no longer hold physical possession of the outsourced data makes the data integrity protection in cloud computing a formidable task particularly for users with constrained computing resources. Moreover users sho...

An approach of Regression testing for Service Oriented Architecture

Service Oriented Architecture (SOA) is an application architecture in which services are described using a description language. It has changed the way business enterprises with technology with a very fast demand of r...

Download PDF file
  • EP ID EP28132
  • DOI -
  • Views 260
  • Downloads 1

How To Cite

H. V. Taiwade (2015). Cloud Computing Security With Two-Level Mechanism. International Journal of Research in Computer and Communication Technology, 4(1), -. https://europub.co.uk/articles/-A-28132