首页    期刊浏览 2025年05月31日 星期六
登录注册

文章基本信息

  • 标题:A Strong Token Authentication And Cryptography Based Application And Data Access For Cloud Users
  • 本地全文:下载
  • 作者:Ali Asgar Hussain ; Reetu Gupta
  • 期刊名称:International Journal of Engineering and Computer Science
  • 印刷版ISSN:2319-7242
  • 出版年度:2015
  • 卷号:4
  • 期号:10
  • 页码:14544-14550
  • 出版社:IJECS
  • 摘要:Cloud computing is the latest trend in comuting by which various services, applications and other computing thingscan be delivered as a service. Mainly it is a formal combination of distributed, grid, cluster, elastic and utility computing. Suchcomputation provides a quality of service based robust usage experience for the user. It serves reduced complexity and serviceexpandability for making standardization. This leads to improved operational efficiencies and offers the client reducedpredictable annual costs. Other benefits were realized in areas, such as self service, service catalog, automatic provisioning anddeprovisioning, and capacity flexibility. A cloud provides clients with features, such as disaster recovery, security, and metering,which enable clients to reduce costs, increase standardization, and improve business continuityIn cloud the data center is the location where the users all confidential information is stored by some security schemesprovided by the service provider. Along with users normal data there is any more secure and private data which need to behidden from even service provider and that type of control is not provided by any provider in the market.Any organization needs securing access to corporate networks, protecting the identities of users, ensuring that a user iswho he claims to be and protecting the integrity of business-critical transactions. However, the recent surge in high-profilesecurity threats, as well as evolving business environments requires entirely new considerations for access control. Cloudofferings and mobile platforms represent a shift in how trust and control is established and maintained.This evolving environment requires a comprehensive set of security services, yet flexible enough to quickly adapt to everchanging requirements without impacting the applications and access control infrastructure in use. Smooth migration is anessential aspect of such flexibility.With this work, the aim is to make the application level of security provided by any of the servers or provide moreeffectively and according to the users need. For achieving the confidentiality attribute based encryption is used. Digital signatureand multi factor authentication like single sign on one (SSO) are some of their examples. They should be delivered as a serviceso that multiple small scale companies might also integrate them to serve their users in a better way. Multiple authenticationmechanisms, like digital signatures, certificates or 2-factor security and several identity validators can coexist and can becombined to suite the most complex needs
  • 关键词:10.18535/ijecs/v4i10.02
国家哲学社会科学文献中心版权所有