Murugesan et al., 2013 - Google Patents
Ensuring User Security and Data Integrity in Multi-CloudMurugesan et al., 2013
View PDF- Document ID
- 10537700767962774757
- Author
- Murugesan K
- Sudheendran S
- Publication year
- Publication venue
- International Journal of Soft Computing and Engineering (USCE)
External Links
Snippet
The most common method used for user security is textual passwords. But they are vulnerable to eves dropping, dictionary attack, shoulder surfing etc. To address this problem, text can be combined with colors to generate session passwords called hybrid textual …
- 238000000034 method 0 abstract description 17
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sood | A combined approach to ensure data security in cloud computing | |
Kim et al. | Lightweight knowledge-based authentication model for intelligent closed circuit television in mobile personal computing | |
CN102687133B (en) | Containerless data for trustworthy computing and data services | |
CN102318262B (en) | Trusted cloud computing and services framework | |
CN103188081A (en) | Systems and methods for distributing and securing data | |
Somu et al. | Authentication service in hadoop using one time pad | |
Attas et al. | Efficient integrity checking technique for securing client data in cloud computing | |
Ahmad et al. | Hybrid cryptography algorithms in cloud computing: A review | |
Kumar | Cloud computing security issues and its challenges: a comprehensive research | |
Nasreldin et al. | Digital forensics evidence acquisition and chain of custody in cloud computing | |
Whyte et al. | Use of blockchain technology in data integrity assurance | |
Nakouri et al. | A new biometric-based security framework for cloud storage | |
Raj et al. | A Lightweight Blockchain Framework for secure transaction in resource constrained IoT devices | |
Dudiki et al. | A Hybrid Cryptography Algorithm to Improve Cloud Computing Security | |
Islam et al. | A novel approach for client side encryption in cloud computing | |
Thangavel et al. | An analysis of privacy preservation schemes in cloud computing | |
Murugesan et al. | Ensuring User Security and Data Integrity in Multi-Cloud | |
Mishra | A proficient mechanism for cloud security supervision in distributive computing environment | |
Khairi | Framework For Modeling and Simulation of Secure Cloud Services | |
Navajothi et al. | An efficient, dynamic, privacy preserving public auditing method on untrusted cloud storage | |
Mageshwari et al. | Decentralized data privacy protection and cloud auditing security management | |
Soman et al. | Secure storage and sharing of visitor images generated by smart entrance on public cloud | |
Aguilar Santiago et al. | Chaotic cryptosystem for selective encryption of faces in photographs | |
Bhatia | User authentication in big data | |
Nguyen et al. | Protecting biometrics using fuzzy extractor and non-invertible transformation methods in kerberos authentication protocol |