Поиск по каталогу |
(строгое соответствие)
|
- Профессиональная
- Научно-популярная
- Художественная
- Публицистика
- Детская
- Искусство
- Хобби, семья, дом
- Спорт
- Путеводители
- Блокноты, тетради, открытки
Implementation of Algorithms for Providing Security and Privacy. In Cloud Based Services
В наличии
Местонахождение: Алматы | Состояние экземпляра: новый |
Бумажная
версия
версия
Автор: B. Hari Krishna,S. Kiran and A. Ashok Kumar
ISBN: 9786203042016
Год издания: 2020
Формат книги: 60×90/16 (145×215 мм)
Количество страниц: 108
Издательство: LAP LAMBERT Academic Publishing
Цена: 28799 тг
Положить в корзину
Позиции в рубрикаторе
Отрасли знаний:Код товара: 577891
Способы доставки в город Алматы * комплектация (срок до отгрузки) не более 2 рабочих дней |
Самовывоз из города Алматы (пункты самовывоза партнёра CDEK) |
Курьерская доставка CDEK из города Москва |
Доставка Почтой России из города Москва |
Аннотация: This book describes the implementation of algorithms for providing security and privacy in cloud-based services. The goal is to avoid the various attacks and to identify a better route to transfer the data securely in the cloud environment. The main objective is to design a proactive approach to ensure valid client authentication by the cloud provider. A Two Factor Authentication (TFA) scheme is proposed based on the One Time Password (OTP) which is generated and sent to authorized users through the mail. Accessing the data in cloud environment is done by the client through authentication, authorization, and integrity. HMAC authentication algorithm is proposed for Network as a Service (NaaS) in the cloud environment to design a secured data transmission through Open Shortest Path First (OSPF) routing protocol. To ensure confidentiality in cloud services, a hybrid mechanism is proposed using symmetric and asymmetric cryptography in SaaS and NaaS environments. Authentication and integrity are tested by implementing HMAC with OSPF protocol and various statistical measures like Clock offset, root delay, root dispersion, and peer dispersion of the time is calculated.
Ключевые слова: Cloud Computing, Cloud services, Cloud Environment, Microsoft Azure Cloud, GNS3, NaaS, AES-ECC