Type of Material: | Thesis |
Title: | Security Protection Mechanism in Cloud Computing Authorization Model |
Researcher: | Balaji, S |
Guide: | Saravana Kumar, S |
Department: | Department of Engineering and Technology(Computer Science and Engineering) |
Publisher: | Bharath University, Chennai |
Place: | Chennai |
Year: | 2020 |
Language: | English |
Subject: | Computer Science | Computer Science Theory and Methods | Engineering and Technology | Computer Science and Information Technology | Engineering and Technology |
Dissertation/Thesis Note: | PhD; Department of Engineering and Technology(Computer Science and Engineering), Bharath University, Chennai, Chennai; 2020; D14CS514 |
Fulltext: | Shodhganga |
000 | 00000ntm a2200000ua 4500 | |
001 | 454707 | |
003 | IN-AhILN | |
005 | 2024-09-18 15:08:40 | |
008 | __ | 240918t2020||||ii#||||g|m||||||||||eng|| |
035 | __ | |a(IN-AhILN)th_454707 |
040 | __ | |aBHAU_600073|dIN-AhILN |
041 | __ | |aeng |
100 | __ | |aBalaji, S|eResearcher |
110 | __ | |aDepartment of Engineering and Technology(Computer Science and Engineering)|bBharath University, Chennai|dChennai|ein |
245 | __ | |aSecurity Protection Mechanism in Cloud Computing Authorization Model |
260 | __ | |aChennai|bBharath University, Chennai|c2020 |
300 | __ | |dDVD |
502 | __ | |bPhD|cDepartment of Engineering and Technology(Computer Science and Engineering), Bharath University, Chennai, Chennai|d2020|oD14CS514 |
520 | __ | |aCloud is that the rising and thirst area of analysis and advantageous in all the fields. However security is the main disquiet for not espouse cloud for each application. Mainly of the security crisis are connected by authentication with data protection by the respect to cloud security alliance (CSA). The projected New (Biometric encoding and Biometric authentication) protocol can conquer every safety crisis in cloud adjacent. In NEW protocol biometric encryption has been provided for the cloud consumer s valuable information and identify verification has been utilized in a unique way to scale back the problems associated with authentication and authorization. In NEW protocol Identity verification in cloud environment has been joint by pattern security in coincidence with four entirely dissimilar and influential encryption algorithms for accumulated safety. This protocol improves biometric template protection by the combination of RSA and AES encryption algorithms in proper locations and 3DES, Blowfi |
650 | __ | |aComputer Science and Information Technology|2UGC |
650 | __ | |aEngineering and Technology|2AIU |
653 | __ | |aComputer Science |
653 | __ | |aComputer Science Theory and Methods |
653 | __ | |aEngineering and Technology |
700 | __ | |aSaravana Kumar, S|eGuide |
856 | __ | |uhttp://shodhganga.inflibnet.ac.in/handle/10603/311253|yShodhganga |
905 | __ | |afromsg |
User Feedback Comes Under This section.