z-logo
open-access-imgOpen Access
Keyless signature infrastructure solution for cloud attacks
Author(s) -
Remya Chandran,
Abhishek Kumar
Publication year - 2018
Publication title -
international journal of engineering and technology
Language(s) - English
Resource type - Journals
ISSN - 2227-524X
DOI - 10.14419/ijet.v7i2.33.14822
Subject(s) - hash function , signature (topology) , computer science , cloud computing , computer security , cryptographic hash function , cryptography , block (permutation group theory) , digital signature , mathematics , operating system , geometry
Keyless Signature Infrastructure (KSI) is a procedure that is used to distribute and verify the signature; only hash function cryptography is being used in this method. KSI uses block chain technology for the signing and verification of the signature. The paper will discuss the solution of different cloud attacks using Keyless Signature Infrastructure.  

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here