Title : Security Protection Mechanism in Cloud Computing Authorization Model

Type of Material: Thesis
Title: Security Protection Mechanism in Cloud Computing Authorization Model
Researcher: Balaji, S
Guide: Saravana Kumar, S
Department: Department of Engineering and Technology(Computer Science and Engineering)
Publisher: Bharath University, Chennai
Place: Chennai
Year: 2020
Language: English
Subject: Computer Science
Computer Science Theory and Methods
Engineering and Technology
Computer Science and Information Technology
Engineering and Technology
Dissertation/Thesis Note: PhD; Department of Engineering and Technology(Computer Science and Engineering), Bharath University, Chennai, Chennai; 2020; D14CS514
Fulltext: Shodhganga

00000000ntm a2200000ua 4500
001454707
003IN-AhILN
0052024-09-18 15:08:40
008__240918t2020||||ii#||||g|m||||||||||eng||
035__|a(IN-AhILN)th_454707
040__|aBHAU_600073|dIN-AhILN
041__|aeng
100__|aBalaji, S|eResearcher
110__|aDepartment of Engineering and Technology(Computer Science and Engineering)|bBharath University, Chennai|dChennai|ein
245__|aSecurity Protection Mechanism in Cloud Computing Authorization Model
260__|aChennai|bBharath University, Chennai|c2020
300__|dDVD
502__|bPhD|cDepartment of Engineering and Technology(Computer Science and Engineering), Bharath University, Chennai, Chennai|d2020|oD14CS514
520__|aCloud is that the rising and thirst area of analysis and advantageous in all the fields. However security is the main disquiet for not espouse cloud for each application. Mainly of the security crisis are connected by authentication with data protection by the respect to cloud security alliance (CSA). The projected New (Biometric encoding and Biometric authentication) protocol can conquer every safety crisis in cloud adjacent. In NEW protocol biometric encryption has been provided for the cloud consumer s valuable information and identify verification has been utilized in a unique way to scale back the problems associated with authentication and authorization. In NEW protocol Identity verification in cloud environment has been joint by pattern security in coincidence with four entirely dissimilar and influential encryption algorithms for accumulated safety. This protocol improves biometric template protection by the combination of RSA and AES encryption algorithms in proper locations and 3DES, Blowfi
650__|aComputer Science and Information Technology|2UGC
650__|aEngineering and Technology|2AIU
653__|aComputer Science
653__|aComputer Science Theory and Methods
653__|aEngineering and Technology
700__|aSaravana Kumar, S|eGuide
856__|uhttp://shodhganga.inflibnet.ac.in/handle/10603/311253|yShodhganga
905__|afromsg

User Feedback Comes Under This section.