CFP last date
20 May 2024
Reseach Article

Assurance Liability and Security in Cloud Computing

by Uttam Kumar Singh, Sudhakar Tripathi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 104 - Number 16
Year of Publication: 2014
Authors: Uttam Kumar Singh, Sudhakar Tripathi
10.5120/18290-9443

Uttam Kumar Singh, Sudhakar Tripathi . Assurance Liability and Security in Cloud Computing. International Journal of Computer Applications. 104, 16 ( October 2014), 38-41. DOI=10.5120/18290-9443

@article{ 10.5120/18290-9443,
author = { Uttam Kumar Singh, Sudhakar Tripathi },
title = { Assurance Liability and Security in Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { October 2014 },
volume = { 104 },
number = { 16 },
month = { October },
year = { 2014 },
issn = { 0975-8887 },
pages = { 38-41 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume104/number16/18290-9443/ },
doi = { 10.5120/18290-9443 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:36:22.113792+05:30
%A Uttam Kumar Singh
%A Sudhakar Tripathi
%T Assurance Liability and Security in Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 104
%N 16
%P 38-41
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing permits extremely scalable services to be simply consumed over the net on as need. In cloud computing services uses information is usually processed by on-line basis or remotely through unknown machines and unknown places, because of this reason user or service supplier is often in worry relating to information loss attributable to each day emerging new technologies. Therefore guaranteeing information liability and security in cloud is incredibly necessary, during this paper gift a Deffie Hellman and coding rule for information liability and security in cloud.

References
  1. Ruj S, NaDiffe Hellman A, Stomernovic I. DACC: distributed access management in clouds. 2011 International Joint Conference of IEEE TrustCom-11/IEEE ICESS-11/FCST-11,IEEE pc Society, 2011:91-98.
  2. M. Klems, A. Lenk, J. Nimis, T. Sandholm and S. Tai. "What's within the Cloud? Associate in Nursing subject area Map of the Cloud Landscape. " IEEE Xplore,pp23-31,june. 2009.
  3. S. Kamara and K. Lauter. scientific discipline cloud storage. In money Cryptography and information Security (FC'10),volume 6054 of LNCS, pages136strong KEY AGREEMENT supported PUBLIC KEY AUTHENTICATION" Proceedings of the fourteenth International Conference on money Cryptography and information Security, Tene-rife,Spain,LNCS6052,pp. 383-390,Jan 2010.
  4. M. Joshi, YS Moudgil "SECURE CLOUD STOARGE" International Journal of applied science 2011, ijcscn. com.
  5. Yaoxue Zhang and Yuezhi Zhou_ "Transparent Computing: Spatio-Temporal Extension on von Neumann design for Cloud Services" TSINGHUA SCIENCE AND TECHNOLOGY, ISSN 1007-0214l l02/12l lpp10-21 Volume eighteen, Number 1, Feb 2013.
  6. Linlin Wu and Rajkumar Buyya "Service Level Agreement (SLA) in Utility Computing Systems" Cloud Computing and Distributed Systems (CLOUDS) Laboratory Department of applied science and package Engineering The University of Melbourne, Australia.
  7. Kawser Wazed Nafi, Tonny Shekha Kar, Sayed Anisul Hoque, Dr. M. M. A Hashem "A Newer User Authentication, File coding and Distributed Server based mostly Cloud Computing security architecture" (IJACSA) International Journal of Advanced applied science and Applications,Vol. 3, No. 10, 2012.
  8. https://cloudsecurityalliance. org/research/secaas/.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud computing ESLC Diffie Hellman ICA traid Security Measures