Please use this identifier to cite or link to this item: http://13.232.72.61:8080/jspui/handle/123456789/480
Full metadata record
DC FieldValueLanguage
dc.contributor.authorNair, Susmita J. A.-
dc.contributor.authorAnitha, K. L.-
dc.contributor.authorKamala, Rosita F.-
dc.date.accessioned2018-11-27T06:52:22Z-
dc.date.available2018-11-27T06:52:22Z-
dc.date.issued2013-11-
dc.identifier.citationNair, Susmita J. A., Anitha, K., & Kamala, Rosita F. (2013). Trusted Third party Authentication in cloud computing. International journal of Engineering Research and Technology. 2(11), 354-358.en_US
dc.identifier.issn2278-0181-
dc.identifier.urihttp://13.232.72.61:8080/jspui/handle/123456789/480-
dc.description.abstractCloud computing is an emerging approach in the field of distributed computing that provides web based services, computation and storage for the community(including business, healthcare and government). The customers are offered dynamically scalable resources and thus the cloud users are economically benefited to a large extent. However, security is a huge concern for cloud user. Some of the areas of security concern in cloud computing are: stored data, data during transmission, user authentication etc. In cloud environment anyone can access the data over the internet. Hence user authentication and access control is very important in the cloud. Trusted third parties are independent service providers and are assumed to have a certain level of trust. The trusted third party facilitates secure communication between two parties who trust this third party. The cloud service providers have the control of the user data and the computational resources. The trusted third party ensures the integrity of the stored data.en_US
dc.language.isoenen_US
dc.publisherIJERTen_US
dc.subjectComputer scienceen_US
dc.subjectComputer networksen_US
dc.subjectComputer configurationen_US
dc.titleTrusted Third Party Authentication in Cloud Computing.en_US
dc.typeArticleen_US
Appears in Collections:Articles

Files in This Item:
File Description SizeFormat 
Trusted Third Party Authentication in Cloud Computing.pdf546.13 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.