The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
A New Approach in Cloud Computing User Authentication
Abstract
Cloud computing provides the full scalability, reliability, high performance and relatively low cost feasible solution as compared to dedicated infrastructure. These features make cloud computing more attractive to users and intruders. It needs more and complex security measures to protect user privacy and data centers. The main concern in this chapter is security, privacy and trust. This chapter will give a discussion and a suggestion for using cloud computing to preserve security and privacy. The malicious hacker and other threats are considering the major cause of leaking security of the personal cloud due to centralized location and remote accesses to the cloud. According to attacks, a centralized location can be easier target rather than several goals and remote access is insecure technologies which offer a boundary of options for attackers to infiltrate enterprises. The biggest concern is attackers that will use the remote connection as a jumping point to get deeper into an organization.
Related Content
Mohib Ullah, Arbab Waseem Abbas, Lala Rukh, Kamran Ullah, Muhammad Inam Ul Haq.
© 2023.
25 pages.
|
Rafi Ullah Khan, Mohib Ullah, Bushra Shafi, Imran Ihsan.
© 2023.
20 pages.
|
Rafi Ullah Khan, Mohib Ullah, Bushra Shafi.
© 2023.
17 pages.
|
Shaukat Ali, Shah Khusro, Mumtaz Khan.
© 2023.
34 pages.
|
Tayyaba Riaz, Iftikhar Alam.
© 2023.
20 pages.
|
Ufuk Uçak, Gurkan Tuna.
© 2023.
22 pages.
|
Muhammad Hamad, Altaf Hussain, Majida Khan Tareen.
© 2023.
21 pages.
|
|
|