¡Envío gratis y en 1 día!* a Península + 5% dcto  ¡Ver más!

menú

0
  • argentina
  • chile
  • colombia
  • españa
  • méxico
  • perú
  • estados unidos
  • internacional
portada Cloud Computing. Strategies for Improving the Performance and Security
Formato
Libro Físico
Editorial
Idioma
Inglés
N° páginas
120
Encuadernación
Tapa Blanda
Dimensiones
21.0 x 14.8 x 0.7 cm
Peso
0.17 kg.
ISBN13
9783346065582

Cloud Computing. Strategies for Improving the Performance and Security

Parashu Ram Pal (Autor) · Priyanka Ora (Autor) · Grin Verlag · Tapa Blanda

Cloud Computing. Strategies for Improving the Performance and Security - Pal, Parashu Ram ; Ora, Priyanka

Sin Stock

Reseña del libro "Cloud Computing. Strategies for Improving the Performance and Security"

Doctoral Thesis / Dissertation from the year 2019 in the subject Computer Science - Internet, New Technologies, language: English, abstract: Continuous advancement in software field and widespread use of software products many innovative applications have emerged, cloud computing is one of them. In cloud computing users need not to install software they just log in the cloud and pay for their required service. As many users are frequently using cloud computing a big question arises here is the security of user's personal data present at cloud. Therefore, we need to safeguard the data in the midst of untrusted processes. On keeping these issues in mind, a security model is designed in this thesis. The whole model is divided into three sections: one is data encryption, second is secure data storage and the third one is maintenance of data integrity. In first section before uploading the file on cloud, file is encrypted by RSA Partial Homomorphic algorithm. Two keys public and private are generated after encryption. Between these two keys public key is known to all but private key is known to only authorize users. In second section, the data owner uploads the encrypted file moreover with this one access permission list containing names of authorized user and their respective permission. In this model two access permissions (Read Only and Read and Write) are defined by the data owner. In third section the cloud provider calculates hash value of uploaded file using MD5 hash algorithm. This hash value is transferred back to the data owner to use it for verification purpose. As Owner performs verification, hash value of the desired data present at cloud is again calculated. Now this new hash value matches with old hash value which is present at owner end. If it matches no modification is performed, if hash value does not match then some modifications has been performed on the uploaded data. After uploading the file on cloud this file is visible to all users. They can

Opiniones del libro

Ver más opiniones de clientes
  • 0% (0)
  • 0% (0)
  • 0% (0)
  • 0% (0)
  • 0% (0)

Preguntas frecuentes sobre el libro

Todos los libros de nuestro catálogo son Originales.
El libro está escrito en Inglés.
La encuadernación de esta edición es Tapa Blanda.

Preguntas y respuestas sobre el libro

¿Tienes una pregunta sobre el libro? Inicia sesión para poder agregar tu propia pregunta.

Opiniones sobre Buscalibre

Ver más opiniones de clientes