Framework for User Authenticity and Access Control Security over a Cloud
Journal Title: International Journal on Computer Science and Engineering - Year 2014, Vol 6, Issue 4
Abstract
Cloud computing has emerged as a computing paradigm bringing forward many new challenges for data security and access control when users outsource sensitive data for sharing on cloud servers, which are not within the same trusted domain as data owners. Considering the user access control part, in recent years many new findings have been worked upon to provide better user access control while accessing services over a cloud. But the problem still remains unresolved and if resolved by some encryption/decryption methods are problematic in some way or the other. Here security issue related to user authentication and access control is addressed and given an insight into it, along with providing some valuable inputs which if implemented according to the plan proposed might come up with better solutions to user authentication and CSP’s critical data security issue. This paper mainly considers various points, like securing access to services of cloud users, protecting user credentials data files stored with CSP and other critical information related with CSP and cloud users.
Authors and Affiliations
Mr. Amit Wadhwa , Dr. V. K. Gupta
Extracting Noun Phrases in Subject and Object Roles for Exploring Text Semantics
In tune with the recent developments in the automatic retrieval of text emantics, this paper is an attempt to extract one of the most fundamental semantic units from natural language text. The context is intuitively ext...
Trust Based Security Routing in Mobile Adhoc Networks
Abstract: Ad hoc networks are widely used in military and other scientific areas. With nodes which can move arbitrarily and connect to any nodes at will, it is impossible for Ad hoc network to own an fixed infrastructure...
Spectrum sensing and Spectrum shifting implementation in a Cognitive Radio based IEEE 802.22 Wireless Regional Area Network
With the technological advancement in wireless applications more effective and efficient utilization of the available spectrum became the urgent requirement. According to the IEEE 802.22 standard the unlicensed secondary...
A Genetic Algorithm Approach for the Solution of Economic Load Dispatch Problem
This paper presents the application of Genetic algorithm (GA) to solve the economic load dispatch problem of the power system. The effectiveness of the proposed algorithm has been demonstrated on two different test syste...
Fingerprint Recognition Using Global and Local Structures
Biometrics is one of the biggest tendencies in human identification. The fingerprint is the most widely used biometric. However considering the automatic fingerprint recognition a completely solved problem is a common mi...