The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud computing is boon in technology field which provide on-demand services in IT enterprises. With storage of data on cloud the challenge of its security and authentication threats occurring. Authentication in cloud computing is a major concerned. The main objective of these technique is to authenticate at client side, server side, or as third party using different method to keep the data in secure...
The cloud computing offers high scalability, confidentiality and the easy accessibility of the information over the Internet. Though the conventional encryption system provides security, the most concerned issue is the regular side channel attack for capturing ones sensitive and confidential image, audio and video. A malicious Virtual Machine (VM) besides a targeted VM can extract all information...
Cloud computing is based on network and computer applications. In cloud data sharing is an important activity. Small, medium, and big organization are use cloud to store their data in minimum rental cost. In present cloud proof their importance in term of resource and network sharing, application sharing and data storage utility. Hence, most of customers want to use cloud facilities and services....
Cloud Computing is the next step in the evolution of on-demand network access to a shared pool of configurable resources that can be rapidly provisioned and released with minimal management effort or service provider interaction where Infrastructure, Platform and Software can be accessed as a service. The clients accessing the service, pay for what they use. Cloud Computing provides benefits in terms...
Cloud computing is getting more popular in the field of computer science because of its reliability in storing and assessing data remotely. In the presence scenario it is very biter to have mobile devices as an interface between user and server, to access and store data for one's need. Mobile technology in cloud computing is helps users to operate on the data for any of the application for their organization...
Providing secure and efficient outsourced storage is a precursor to widespread cloud deployment and availability. For this purpose, existing designs mainly rely on block ciphers, although stream ciphers are more computationally-efficient than block ciphers. This paper presents a construction of secure storage, BLAST, enhanced with a stream cipher rather than a block cipher with a novel block accessible...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.