2017
DOI: 10.1007/s12243-017-0578-3
|View full text |Cite
|
Sign up to set email alerts
|

Security and privacy issues in cloud computing

Abstract: Cloud computing is a state-of-the-art technological innovation providing an extensive list of benefits for almost every business and governmental, small or medium-sized organizations. It has truly revolutionized the computational era by cutting down cost and reducing complexities of infrastructural configurations for computational platforms. This state-of-the-art technology is rapidly being adapted by various large organizations from healthcare to critical infrastructure to carry out their business processes t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 36 publications
(19 citation statements)
references
References 11 publications
0
19
0
Order By: Relevance
“…The username is set to the 128bit length field. After that, split the augmented data into blocks utilizing a 64bit username that is derived as of the current block, centred on the square root of the initial eight prime numbers (2)(3)(4)(5)(6)(7)(8)(9)(10)(11)(12)(13)(14)(15)(16)(17)(18)(19). Next, update the 512-bit buffer utilizing a round constant centred on the cube root of the initial 80 prime numbers .…”
Section: (A) Registrationmentioning
confidence: 99%
See 1 more Smart Citation
“…The username is set to the 128bit length field. After that, split the augmented data into blocks utilizing a 64bit username that is derived as of the current block, centred on the square root of the initial eight prime numbers (2)(3)(4)(5)(6)(7)(8)(9)(10)(11)(12)(13)(14)(15)(16)(17)(18)(19). Next, update the 512-bit buffer utilizing a round constant centred on the cube root of the initial 80 prime numbers .…”
Section: (A) Registrationmentioning
confidence: 99%
“…The defense of data in every one of these six steps is necessary. The privacy of the data whilst sharing by means of the internet is made certain via numerous access control mechanisms [11], say PAP, CHAP, extensible authentication protocol together with cryptographic methods. PAP is susceptible to being read as of the point-to-point protocol (PPP) data packets swapped betwixt the authentication server and the consumer's machine.…”
Section: Introductionmentioning
confidence: 99%
“…• Availability ensures that data and services are always available for its users at any time, at any place • Confidentiality means that user's data are only available to authorized users, which keeps their data secret • Integrity assures that data has not been changed during storage and transmission over the network • Authenticity is a core security requirement in cloud computing systems, which requires mutual trust between the parties (Abbas and Khan, 2014;Abbas et al, 2017). In addition, it is important for authenticity to validate that both parties involved are who they claim to be • Accountability assures that no entity can deny its participation in a data transfer between them…”
Section: Security In Cloudmentioning
confidence: 99%
“…In order to, conceptual technique to develop a technique which can assess the real level of security assessment. Security development techniques are tremendously desirable for internal structure of cloud, design and other feature of cloud [1]. Cloud computing is an original computing model that will intersect the large-scale compute resources to successfully put together, and to compute resources as a service to users.…”
Section: Introductionmentioning
confidence: 99%
“…al. Highlights the concept of cloud computing [1]. Some of the concepts are looking for examples of long-term Dr. Brijesh Kumar Bhardwaj, Associate Professor, Department of MCA, Dr. R. M. L. Avadh University, Ayodhya, India applications in this paper, which is known to be urban how using cloud compute and they never give to hand the increasing world to benefit from the up-and-benefit Can Incoming technology.…”
Section: Introductionmentioning
confidence: 99%