Implement Security using smart card on Cloud
Journal: International Journal of Advanced Computer Research (IJACR) (Vol.3, No. 9)Publication Date: 2013-04-16
Authors : Amish Kumar Aman; Vijay Prakash;
Page : 106-110
Keywords : Clo ud Computing; Security; Public Verifiability;
Abstract
Cloud is a concept of accessing the data from their own datacenters such that the chances of eavesdropping have been reduced and storage cost is reduced. Here in this paper we are giving a brief survey of various cloud based technique implemented so far. A lthough there are various techniques implemented so far for the cloud computing but here we are giving a survey of not only cloud based techniques but also the concept of smart cards for the authentication between one cloud to another cloud.
Other Latest Articles
- Plasmonics based VLSI processes
- Image Denoising based on Fourth-Order Partial Differential Equations: A Survey
- A Bandwidth-Efficient Cooperative Authentication and an En-route Filtering Scheme for Filtering Injected False Data in Wireless Sensor Networks
- An Ensemble Method based on Particle of Swarm for the Reduction of Noise, Outlier and Core Point
Last modified: 2014-11-28 21:47:21