Authentication based Hybrid Security Method for Securing Data in Cloud Environment
Author(s) -
Sanjivani Patwa,
Jayram Dwivedi
Publication year - 2016
Publication title -
international journal of computer applications
Language(s) - English
Resource type - Journals
ISSN - 0975-8887
DOI - 10.5120/ijca2016909202
Subject(s) - computer science , computer security , cloud computing , authentication (law) , database , operating system
With the modern use of services of the cloud computing, the users need higher security. Therefore safety of the cloud computing is a first consideration of the users to select. In the establishment of the cloud computing, application proportion of the virtualization increases gradually, scope and the depth of safety also expanded gradually. The associated concepts of the cloud computing and its establishment conditions are discussed in this paper. In this paper the foundation of the internationalcertification-institute is suggested for service providing companies to raise the trust and improve the likeliness of utilizing this advance and valuable technique among the people. If the security is not fixed and powerful, then the flexibility and the benefits that a cloud computing has to provide will have the few prospect. This will facilitates the researchers and the security professionals to understand about the users concerns and the vendors concerns and the critical analysis regarding the various research types suggested.
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom