Framework for User Authenticity and Access Control Security over a Cloud
Journal Title: International Journal on Computer Science and Engineering - Year 2014, Vol 6, Issue 4
Abstract
Cloud computing has emerged as a computing paradigm bringing forward many new challenges for data security and access control when users outsource sensitive data for sharing on cloud servers, which are not within the same trusted domain as data owners. Considering the user access control part, in recent years many new findings have been worked upon to provide better user access control while accessing services over a cloud. But the problem still remains unresolved and if resolved by some encryption/decryption methods are problematic in some way or the other. Here security issue related to user authentication and access control is addressed and given an insight into it, along with providing some valuable inputs which if implemented according to the plan proposed might come up with better solutions to user authentication and CSP’s critical data security issue. This paper mainly considers various points, like securing access to services of cloud users, protecting user credentials data files stored with CSP and other critical information related with CSP and cloud users.
Authors and Affiliations
Mr. Amit Wadhwa , Dr. V. K. Gupta
A Review on Anti-Theft System Devised Using Brain Waves
Cars are providing luxurious way of driving but due to the increase in the number of car thefts cars need to be made more secured and safer. Safety and Security are two important things that are to be concerned in today’...
An Efficient Agent-Based AODV Routing Protocol in MANET
A MANET (Mobile Adhoc Network) consists of a collection of mobile nodes communicating with each other without any fixed infrastructure such as access points or base stations. MANETS are self organizing or self restoring....
ADAPTIVE RESONANCE THEORY (ART1) APPROACH IN CBIR SYSTEM
In these days an image retrieval system has become a challenging task. Many systems based on the text based retrieval but the need of image based retrieval system that takes an image as the input query and retrieves imag...
A Comprehensive Assessment of Object-Oriented Software Systems Using Metrics Approach
Demand for efficient software is increasing day by day and bject-oriented design technique became able to fulfill this demand because it is the most powerful mechanism to develop efficient software systems. It can not o...
IRIS RECOGNITION BASED ON GAUSSIAN-HERMITE MOMENTS
Iris recognition is accepted as one of the most efficient biometric method. Implementing this method to the practical system requires the special image preprocessing where the iris feature extraction plays a crucial role...