Please use this identifier to cite or link to this item:
http://13.232.72.61:8080/jspui/handle/123456789/480
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Nair, Susmita J. A. | - |
dc.contributor.author | Anitha, K. L. | - |
dc.contributor.author | Kamala, Rosita F. | - |
dc.date.accessioned | 2018-11-27T06:52:22Z | - |
dc.date.available | 2018-11-27T06:52:22Z | - |
dc.date.issued | 2013-11 | - |
dc.identifier.citation | Nair, Susmita J. A., Anitha, K., & Kamala, Rosita F. (2013). Trusted Third party Authentication in cloud computing. International journal of Engineering Research and Technology. 2(11), 354-358. | en_US |
dc.identifier.issn | 2278-0181 | - |
dc.identifier.uri | http://13.232.72.61:8080/jspui/handle/123456789/480 | - |
dc.description.abstract | Cloud computing is an emerging approach in the field of distributed computing that provides web based services, computation and storage for the community(including business, healthcare and government). The customers are offered dynamically scalable resources and thus the cloud users are economically benefited to a large extent. However, security is a huge concern for cloud user. Some of the areas of security concern in cloud computing are: stored data, data during transmission, user authentication etc. In cloud environment anyone can access the data over the internet. Hence user authentication and access control is very important in the cloud. Trusted third parties are independent service providers and are assumed to have a certain level of trust. The trusted third party facilitates secure communication between two parties who trust this third party. The cloud service providers have the control of the user data and the computational resources. The trusted third party ensures the integrity of the stored data. | en_US |
dc.language.iso | en | en_US |
dc.publisher | IJERT | en_US |
dc.subject | Computer science | en_US |
dc.subject | Computer networks | en_US |
dc.subject | Computer configuration | en_US |
dc.title | Trusted Third Party Authentication in Cloud Computing. | en_US |
dc.type | Article | en_US |
Appears in Collections: | Articles |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Trusted Third Party Authentication in Cloud Computing.pdf | 546.13 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.