An Efficient Method to Prevent Information Leakage in Cloud
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3
Abstract
Abstract : Cloud Computing is storing and accessing data and programs over the Internet instead of personal computers. It is a computing paradigm shift where computing is moved away from personal computers or an individual server to a cloud of computers. Its flexibility, cost-effectiveness, and dynamically re-allocation of resources as per demand make it desirable. As desirable as it is, it has also created security challenges such as information leakage, account hijacking and denial of service. The proposed work is to develop a Software as a Service application to prevent information leakage by providing multifactor authentication, risk assessment, encryption using enhanced elliptic curve cryptography where a cryptographically secure random number generation is used to make the number unpredictable, data integrity, key management and secure disposal of information. The platform for deployment of the application is Google App Engine.
Authors and Affiliations
Nina Pearl Doe , Sumaila Alfa , V. Suganya
A Novel System of Fingerprint Recognition Approach for Immigration Control
Abstract : Insecurity is a pressing and important issue that needs urgent attention in Nigeria. The dramatic increase in worldwide flow of people, goods, and ideas has created a new group of threats. These are glob...
Detecting Masquerade in Face Recognition System – A Literature survey
A masquerader is an (often external) attacker is one who, after succeeding in obtaining a legitimateuser’s credentials, attempts to use the stolen identity to carry out malicious actions.Automatic detection of...
Relational Web Wrapper: A Web Data Extraction Approach
Abstract : The information over the internet is growing at rapid rate, so web data extraction systems arerequired to extract the required information. One such technique is web wrapper, which is a supervisedlearning appr...
A Study on Mobile Telecom Network Traffic Using Mobility Pattern
Abstract: In the present the Gradient Adaptive protocol is to efficiently maintain a sequence at a particular geographic location in a light network of highly mobile nodes without using infrastructure networks. To...
Modified Method of Generating Randomized Latin Squares
In combinatorics and in experimental design, Latin square (LS) plays a vital role. It has been studied for centuries and especially used in statistics. Let L(n) be the number of Latin square of order n . L(n) incre...