SECURITY ALGORITHM IN CLOUD COMPUTING: OVERVIEW
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 9
Abstract
Network security is becoming more and more important as people spend more and more time connected. It is a specialized field in computer networking that involves securing a computer network infrastructure. It is typically handled by a network administrator or system administrator who implements the security policy, network software and hardware needed to protect a network and the resources accessed through the network from unauthorized access. It also ensures that we have an adequate access to the network and resources to work. A network security system typically lies on the layers of protection and consists of multiple components including networking monitoring and security software in addition to hardware and the appliances. All components work together to increase the overall security of the computer network. For enhancing the security, many algorithms are widely used. Cloud Computing is a set of IT based Services that are provided to a customer over a network and these services are delivered by a third party provider who owns the infrastructure. It is often provided "as a service" over the Internet and that was typically in the form of infrastructure as a service (IaaS), platform as a service (PaaS), software as a service (SaaS), data storage as a service (DSaaS). This research paper presents what cloud computing is, security algorithms and the challenges in cloud computing.
Authors and Affiliations
M. Vijayapriya
EQUALITY IN BETWEEN ITERATIVE SOFT DILATION AND ITERATIVE SOFT CLOSE IN MULTI SCALE ENVIRONMENT
In this paper, equality is established and discussed in between soft dilation and soft close in multi scale environment as well as in iterative environment. Soft erosion and soft dilation will exist for various threshold...
MULTI CLOUDS MODEL FOR SERVICE AVAILABILITY AND SECURITY
Cloud computing can and does mean different things to different people. The common characteristics most share are on-demand scalability of highly available and reliable pooled computing resources, secure access to metere...
A Brief Introduction of Different type of Security Attacks found in Mobile Ad-hoc Network
A structure less network is called the mobile ad-hoc network, where all the nodes are independent. In MANET, there is a collection of mobile nodes that from temporary network. Those nodes are act like a host or like a ro...
DIVERSE ROUTING IN NETWORKS WITHOUT DISJOINTNESS CONSTRAINT USING PROBABILISTIC FAILURES
To develop a various routing theme for coping with multiple, presumably related to failures. Isolated single link failures is effectively restrained disjoint path protection, however mechanisms for sick from multiple fai...
Implementation of Knowledge Mining with Ontology
Today, huge amount of data available on the web in the form of unstructured, semi-structured and unstructured data. With the use of ontology we can make structured data and use of knowledge mining. As, the knowledge mini...