Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Assurance Liability and Security in Cloud Computing

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 104 - Number 16
Year of Publication: 2014
Authors:
Uttam Kumar Singh
Sudhakar Tripathi
10.5120/18290-9443

Uttam Kumar Singh and Sudhakar Tripathi. Article: Assurance Liability and Security in Cloud Computing. International Journal of Computer Applications 104(16):38-41, October 2014. Full text available. BibTeX

@article{key:article,
	author = {Uttam Kumar Singh and Sudhakar Tripathi},
	title = {Article: Assurance Liability and Security in Cloud Computing},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {104},
	number = {16},
	pages = {38-41},
	month = {October},
	note = {Full text available}
}

Abstract

Cloud computing permits extremely scalable services to be simply consumed over the net on as need. In cloud computing services uses information is usually processed by on-line basis or remotely through unknown machines and unknown places, because of this reason user or service supplier is often in worry relating to information loss attributable to each day emerging new technologies. Therefore guaranteeing information liability and security in cloud is incredibly necessary, during this paper gift a Deffie Hellman and coding rule for information liability and security in cloud.

References

  • Ruj S, NaDiffe Hellman A, Stomernovic I. DACC: distributed access management in clouds. 2011 International Joint Conference of IEEE TrustCom-11/IEEE ICESS-11/FCST-11,IEEE pc Society, 2011:91-98.
  • M. Klems, A. Lenk, J. Nimis, T. Sandholm and S. Tai. "What's within the Cloud? Associate in Nursing subject area Map of the Cloud Landscape. " IEEE Xplore,pp23-31,june. 2009.
  • S. Kamara and K. Lauter. scientific discipline cloud storage. In money Cryptography and information Security (FC'10),volume 6054 of LNCS, pages136strong KEY AGREEMENT supported PUBLIC KEY AUTHENTICATION" Proceedings of the fourteenth International Conference on money Cryptography and information Security, Tene-rife,Spain,LNCS6052,pp. 383-390,Jan 2010.
  • M. Joshi, YS Moudgil "SECURE CLOUD STOARGE" International Journal of applied science 2011, ijcscn. com.
  • Yaoxue Zhang and Yuezhi Zhou_ "Transparent Computing: Spatio-Temporal Extension on von Neumann design for Cloud Services" TSINGHUA SCIENCE AND TECHNOLOGY, ISSN 1007-0214l l02/12l lpp10-21 Volume eighteen, Number 1, Feb 2013.
  • Linlin Wu and Rajkumar Buyya "Service Level Agreement (SLA) in Utility Computing Systems" Cloud Computing and Distributed Systems (CLOUDS) Laboratory Department of applied science and package Engineering The University of Melbourne, Australia.
  • Kawser Wazed Nafi, Tonny Shekha Kar, Sayed Anisul Hoque, Dr. M. M. A Hashem "A Newer User Authentication, File coding and Distributed Server based mostly Cloud Computing security architecture" (IJACSA) International Journal of Advanced applied science and Applications,Vol. 3, No. 10, 2012.
  • https://cloudsecurityalliance. org/research/secaas/.