IMPLEMENTING DIGITAL SIGNATURE WITH RSA AND HONEYPOT TO ENHANCE THE DATA SECURITY OF CLOUD IN CLOUD COMPUTING
##plugins.themes.bootstrap3.article.main##
Abstrak:
The cloud is a next generation platform that provides dynamic resource pools, virtualization, and high availability. Today, we have the ability to utilize scalable, distributed computing environments within the confines of the Internet, a practice known as cloud computing. Cloud computing is the Concept Implemented to decipher the Daily Computing Problems, likes of Hardware Software and Resource Availability unhurried by Computer users. The cloud Computing provides an undemanding and Non ineffectual Solution for Daily Computing.
##plugins.themes.bootstrap3.article.details##
##submission.howToCite##:
##submission.citations##:
Uma Somani,Kanika Lakhani and Manish Mundra , ’Implementing Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing” ,978- 1-4244-7674-9/10/$26.00 ©2010 IEEE
http://en.wikipedia.org/wiki/Cloud_computing
http://www.cloudcomputing china.cn/Article/l uilan/200909/306.html
http://searchcloudcomputing.techtarget.com/s Definition/0, sid201_gci1287881,00.html
http://www.boingboing.net/2009/09/02/cloudcomputing -skep.html
(U.S.) Nicholas. Carr, fresh Yan Yu, "IT is no longer important: the Internet great change of the high round - cloud computing," The Big Switch: Rewining the world from Edison to Google, CITIC ublishing House, October 2008 1-1
M. Sowmiya, PG Student and M. Adimoolam, Assistant Professor ,“Secure Cloud Storage Model with Hidden Policy Attribute based Access Control” ,978-1- 4799- 4989- 2/14/$31.00 © 2014 IEEE
S. Ruj, M. Stojmenovic and A. Nayak, “Decentralized Access Control with Anonymous Authentication of Data Stored in Cloud”, IEEE/ACMInternational Symposium on Cluster, Cloud and Grid Computing, pp. 556–563, 2013
S. Jahid, P. Mittal and N. Borisov, “EASiER: Encryption-based access control in social networks with efficient Re-vocation,” in ACM ASIACCS.
Kan Yang, XiaohuaJia and Kui Ren, ‘DAC-MACS: Effective DataAccess Control for MultiAuthority Cloud Storage Systems’, IACR Cryptology e-Print Archive, pp 419, 2012.
D. R. Kuhn, E. J. Coyne, and T. R. Weil, “Adding attributes to role-basedaccess control,” IEEE Computer, vol. 43, no. 6, pp. 79–81, 2010.
C. Wang, Q. Wang, K. Ren, N. Cao and W. Lou, “Toward Secure andDependable Storage Services in Cloud Computing”, IEEE T. Services Computing, vol. 5, no. 2, pp. 220–232, 2012.
Hur and Kun Noh, “Attribute-Based Access Control with EfficientRevocation in Data outsourcing Systems”, IEEE Trans. Parallel Distrib.Syst.,vol. 22, no. 7, pp. 1214–1221, 2011.
Dr. Vinayak Ashok Bharadi and Mr. Godson Michael D’silva, “Online SignatureRecognition using Software as a Service (SaaS) Model on Public Cloud” ,978-1- 4799-6892-3/15 $31.00 © 2015 IEEEDOI 10.1109/ICCUBEA.2015.208
H B Kekre, V A Bharadi , “Dynamic signature preprocessing by modifieddigital difference analyzer algorithm” , Springer India, Thinkquest, pp 67-73, 2011.
