An Efficient Method to Prevent Information Leakage in Cloud
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3
Abstract
Abstract : Cloud Computing is storing and accessing data and programs over the Internet instead of personal computers. It is a computing paradigm shift where computing is moved away from personal computers or an individual server to a cloud of computers. Its flexibility, cost-effectiveness, and dynamically re-allocation of resources as per demand make it desirable. As desirable as it is, it has also created security challenges such as information leakage, account hijacking and denial of service. The proposed work is to develop a Software as a Service application to prevent information leakage by providing multifactor authentication, risk assessment, encryption using enhanced elliptic curve cryptography where a cryptographically secure random number generation is used to make the number unpredictable, data integrity, key management and secure disposal of information. The platform for deployment of the application is Google App Engine.
Authors and Affiliations
Nina Pearl Doe , Sumaila Alfa , V. Suganya
Influence of Socioeconomic Status and Expectations among Completely Edentulous Patients on Conventional Complete Denture Treatment
Objective: The purpose of this study was to determine the effect of socioeconomic status on patient expectation from the treatment through a Questionnaire based survey. Material and Method: The Present study was conducte...
Hierarchical Dirichlet Process for Dual Sentiment Analysis with Two Sides of One Review
Abstract: Sentiment categorization is a fundamental process in sentiment examination, by means of it’s intended to categorize the sentiment into either positive or negative for given text. The wide-ranging perform in sen...
A New Skin Color Based Face Detection Algorithm by CombiningThree Color Model Algorithms
Abstract: Human face recognition systems have gained a considerable attention during last decade due to itsvast applications in the field of computer and advantages over previous biometric methods. There are manyap...
Providing efficient measurable key by using unital based key pre-distribution scheme for wireless sensor networks
Abstract: Resource limitations and potential WSNs application and key management are the challenging issues for WSNs. Network scalability is one of the important things in designing a key management scheme. So we a...
Real Time Hand Gesture Recognition for Human Machine Communication Using ARM Cortex A-8
Abstract: A novel method proposes for human machine communication using ARM Cortex A-8 processor. Gesture is a form of non-verbal communication in which visible bodily actions communicate particular messages. A nov...