[go: up one dir, main page]

Murugesan et al., 2013 - Google Patents

Ensuring User Security and Data Integrity in Multi-Cloud

Murugesan et al., 2013

View PDF
Document ID
10537700767962774757
Author
Murugesan K
Sudheendran S
Publication year
Publication venue
International Journal of Soft Computing and Engineering (USCE)

External Links

Snippet

The most common method used for user security is textual passwords. But they are vulnerable to eves dropping, dictionary attack, shoulder surfing etc. To address this problem, text can be combined with colors to generate session passwords called hybrid textual …
Continue reading at www.academia.edu (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Sood A combined approach to ensure data security in cloud computing
Kim et al. Lightweight knowledge-based authentication model for intelligent closed circuit television in mobile personal computing
CN102687133B (en) Containerless data for trustworthy computing and data services
CN102318262B (en) Trusted cloud computing and services framework
CN103188081A (en) Systems and methods for distributing and securing data
Somu et al. Authentication service in hadoop using one time pad
Attas et al. Efficient integrity checking technique for securing client data in cloud computing
Ahmad et al. Hybrid cryptography algorithms in cloud computing: A review
Kumar Cloud computing security issues and its challenges: a comprehensive research
Nasreldin et al. Digital forensics evidence acquisition and chain of custody in cloud computing
Whyte et al. Use of blockchain technology in data integrity assurance
Nakouri et al. A new biometric-based security framework for cloud storage
Raj et al. A Lightweight Blockchain Framework for secure transaction in resource constrained IoT devices
Dudiki et al. A Hybrid Cryptography Algorithm to Improve Cloud Computing Security
Islam et al. A novel approach for client side encryption in cloud computing
Thangavel et al. An analysis of privacy preservation schemes in cloud computing
Murugesan et al. Ensuring User Security and Data Integrity in Multi-Cloud
Mishra A proficient mechanism for cloud security supervision in distributive computing environment
Khairi Framework For Modeling and Simulation of Secure Cloud Services
Navajothi et al. An efficient, dynamic, privacy preserving public auditing method on untrusted cloud storage
Mageshwari et al. Decentralized data privacy protection and cloud auditing security management
Soman et al. Secure storage and sharing of visitor images generated by smart entrance on public cloud
Aguilar Santiago et al. Chaotic cryptosystem for selective encryption of faces in photographs
Bhatia User authentication in big data
Nguyen et al. Protecting biometrics using fuzzy extractor and non-invertible transformation methods in kerberos authentication protocol