A Novel Approach of Cloud Security by Authentication in Cloud Computing Environment
Vaibhav Sardana1 , Nidhi Saxena2
Section:Review Paper, Product Type: Journal Paper
Volume-7 ,
Issue-10 , Page no. 256-257, Oct-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i10.256257
Online published on Oct 31, 2019
Copyright © Vaibhav Sardana, Nidhi Saxena . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Vaibhav Sardana, Nidhi Saxena, “A Novel Approach of Cloud Security by Authentication in Cloud Computing Environment,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.10, pp.256-257, 2019.
MLA Style Citation: Vaibhav Sardana, Nidhi Saxena "A Novel Approach of Cloud Security by Authentication in Cloud Computing Environment." International Journal of Computer Sciences and Engineering 7.10 (2019): 256-257.
APA Style Citation: Vaibhav Sardana, Nidhi Saxena, (2019). A Novel Approach of Cloud Security by Authentication in Cloud Computing Environment. International Journal of Computer Sciences and Engineering, 7(10), 256-257.
BibTex Style Citation:
@article{Sardana_2019,
author = {Vaibhav Sardana, Nidhi Saxena},
title = {A Novel Approach of Cloud Security by Authentication in Cloud Computing Environment},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2019},
volume = {7},
Issue = {10},
month = {10},
year = {2019},
issn = {2347-2693},
pages = {256-257},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4930},
doi = {https://doi.org/10.26438/ijcse/v7i10.256257}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i10.256257}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4930
TI - A Novel Approach of Cloud Security by Authentication in Cloud Computing Environment
T2 - International Journal of Computer Sciences and Engineering
AU - Vaibhav Sardana, Nidhi Saxena
PY - 2019
DA - 2019/10/31
PB - IJCSE, Indore, INDIA
SP - 256-257
IS - 10
VL - 7
SN - 2347-2693
ER -
VIEWS | XML | |
367 | 1293 downloads | 167 downloads |
Abstract
Now a days Internet grows up rapidly. Anything depends on network. This internet provide huge services to the users like data transfer, uploading, downloading etc… some of network services also provide security too. But here data storage is major task, its highly impossible to store huge data in network. Now the new emerging technology is cloud computing, its improve the performance, scalability and low cost to implement. Its provides many services to clients. Like upload the data retrieve the data etc… many organizations are depends on this storage service. We can install the cloud private or public or both. But cloud computing suffer from unauthorized data access. Still there is no permanent solution. These paper main objects are a) Prevent from unauthorized access b) prevent unnecessary steps to access the cloud c) To apply some tasks on cloud
Key-Words / Index Term
cloud computing, authentication, security methods, networks, TS (Trusted System)
References
[1] M. Jensen, J. Schwenk, N. Gruschka, and L. Lo Iacono, On Technical Security Issues in Cloud Computing. IEEE, 2009.
[2] Greg Boss, Padma Malladi, Denis Quan, Linda Legregni, Harold Hall, “Cloud Computing”, http://www.ibm.com/developerswork/websp here/zones/hipods/library.html, October 2007, pp. 4-4
[3] “Wesam Dawoud, Ibrahim Takouna, Christoph Meinel Infrastructure as a Service Security.
[4] D. L. G. Filho and P. S. L. M. Barreto, “Demonstrating Data Possession and Uncheatable Data Transfer,” Cryptology ePrint Archive, Report 2006/150, 2006, http://eprint.iacr.org/.
[5] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable Data Possession at Untrusted Stores,” Proc. of CCS ’07, pp.598–609, 2007.
[6] Arshad, J, Townsend, P. and Xu, J. (2013).A novel intrusion severity analysis approach for Clouds. Future Generation Computer Systems, 29, 416–428. doi:10.1016/j.future.2011.08.009
[7] Atayero, A.A. and Feyisetan, O. (2011). Security Issues in Cloud Computing: The Potentials of Homomorphic