Cloud computing is the concept of using maximum remote services through a network using various minimum resources, it provides these resources to users via internet. There are many critical problems appeared with cloud computing such as data privacy, security, and reliability etc. But we find that security is the most important between these problems. In this research paper, the proposed approach is to eliminate the concerns regarding data security using bio hash function for biometrics template security to enhance the security performance in cloud as per different perspective of cloud customers. Experiments using well know benchmark CASIA fingerprint-V5 data sets show that the obtained results proved that using Bio-hash function approach is more efficient in protecting the biometric template compared to Crypto-Biometric Authentication approach and the error rate is minimized by 25%.
Abstract-System virtualization is an antique art that will continue as long as applications need isolation and performance independence. Virtualization provides many benefits and greater efficiency in CPU utilization, greener IT with less power consumption, better management through central environmental control, more availability, reduced project timelines by eliminating hardware procurement, improved disaster recovery capability, more central control of the desktop, and improved outsourcing services. In this paper we will deliver new and enhanced IT services in less time and with greater agility. The goal of providing rapid near real-time response to customer requirements is in part being achieved by taking advantage of virtualization. Virtualization provides many benefits, including improved physical resource utilization, improved hardware efficiency, and reduced power and cooling expenses. However, it introduces another set of systems (virtual machines) that have to be controlled, provisioned, managed, updated, patched, and retired. This paper is organized into the following areas-An introduction to virtualization and its benefits, the Challenges of Virtualization techniques, an overview of the hardware virtualization technique, an overview of the software virtualization technique. The paper also proposes an effective and flexible distributed scheme with three phases, opposing to its predecessors. Our scheme achieves reducing the workload of a data center and continual service improvement.
Defense in Depth is practical strategy for achieving Information Assurance in today's highly datacenter environments. It is a "best practices" strategy in that it relies on the intelligent application of techniques and technologies that exist today. The strategy recommends a balance between the protection capability and cost, performance, and operational considerations. This paper provides an overview of the major elements of the strategy and provides links to resources that provide additional insight. Co mpanies need to address the security challenges of datacenter using a comprehensive defense-in-depth strategy. No single security solution will keep a determined thief fro m the goal of compro mising the hardware or software given enough time and resources. Applying mu ltip le layers of system security will slow the progress made by a thief, and hopefully, force the thief to abandon the pursuit, at the least, resale of the stolen property, and at worst, of confidential corporate data. The Defense in depth is the concept of protecting a Datacenter with a series of defensive mechanisms such that if one mechanism fails, another will already be in place to thwart an attack. In this paper, the main focus is given to highlight the security aspects of data center fro m perspectives of threats and attacks from one side and approaches for solutions from the other side. The paper also proposes an effective and flexib le d istributed scheme with two salient features. Our scheme ach ieves the integration of continual security imp rovement and Security Risk localizat ion. This paper deals with the implementation of defense in depth at a strategic, principle-based level and provides additional guidance on specific sets of controls that may be applicable to support an organizat ion's defense in depth init iatives.
Abstract-one of the most important techniques for improving the performance of web based applications is web proxy caching Technique. It is used for several purposes such as reduce network traffic, server load, and user perceived retrieval delays by replicating popular content on proxy caches that are strategically placed within the network. The use of web proxy caching is important and useful in the government organizations that provides services to citizens and has many branches all over the country where it is beneficial to improve the efficiency of the computer networks performance, especially remote areas which suffer from the problem of poor network communication. Using of proxy caches provides all users in the government computer networks by reducing the amount of redundant traffic that circulates through the network. It also provides them by getting quicker access to documents that are cached. In addition, there are a lot of benefits we can obtain from the using of proxy caches but we will address them later. In this research, we will use web proxy caching to provide all of the above benefits that we are mentioned above and to overcome on the problem of poor network communication in ENR (Egyptian National Railways). We are going to use a scheme to achieve the integration of forward web proxy caching and reverse proxy caching.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.