ENERGY CONSERVATION IN CLOUD ENVIRONMENTS USING ALTERNATIVE EMAIL-ID APPROACH
Journal Title: International Journal on Computer Science and Engineering - Year 2014, Vol 6, Issue 5
Abstract
(100%)Cloud computing is a new Model for deliver and accessing the services over the Internet. So cloud provider responsibility to verify the user or client is Authorized or not.For this purpose cloud provider shall provide some Authencatation mechanism and satisfying that cloud provider concludes that the client is Authorized. During the verification of authorizatation mechanism,In . Traditional way cloud provider uses the password and Biometric authentication mechanism. During this process Cloud provider shall maintain the large database for storing the biometric parameters like finger print ,images etc..and need a Computational resources to verifying that. Here it’s the problem for wastage the resources. To Eliminate the for maintaining the Large database and computational resources we proposed a technique called Alternative E-Mail- ID+UniqueIdentatification Number (UIN)+Person identity information approach for Authentication purpose for cloud providers.
Authors and Affiliations
B. KrishnaPrasad , Dr. K. Tirupathirao , G. C. N. Mahesh
An Implementation Approach for Intrusion Detection System in Wireless sensor Network
The Intrusion Detection System (IDS) has become a critical component of wireless sensor networks security strategy. In this paper we have made an effort to document related issues and challenges of intrusion detection sy...
Improved Hybrid Clustering and Distance-based Technique for Outlier Removal
Outliers detection is a task that finds objects that are dissimilar or inconsistent with respect to the remaining data. It has many uses in applications like fraud detection, network intrusion detection and clinical diag...
Data Confidentiality and Loss Prevention using Virtual Private Database
As organizations increase their adoption of database systems as the key data management technology for day-to-day operations and decision making, the security of data managed by these systems becomes crucial. Database sy...
PERFORMANCE CONTRIBUTION BASED SCHEDULING FRAMEWORK FOR PRECEDENCE CONSTRAINT TASKS IN REAL TIME SYSTEM
It is quite possible that in a process set, process may be having earliest deadline but its performance contribution is low in process set. Scheduling such processes with highest priority does not carry any meaning. Majo...
SSL-MAP: A More Secure Gossamer-based Mutual Authentication Protocol for Passive RFID Tags
Abstract— RFID systems that employ passive RFID tags, are run using lightweight protocols. The Gossamer protocol is a case in point. However, it is found that the Gossamer protocol uses rather simple operations, in order...