The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Cloud Auditor Loyalty Checking Process Using Dual Signature
Abstract
We apply dual signature method. Providing security to the data from auditor during remote data possession checking by applying dual signature. Basically dual signature is a mechanism that is used to provide security during secure electronic transition protocol. The function of dual signature is to provide authenticity and integrity of the data. It links two message wished for two different recipient. In the case of providing security from auditor we use this methodology because it works on the basic of providing two links for two different recipients. In the case of dual signature customer wants to send order information to the trader and payment information to the bank. Here we use two links but not for the purpose of secure transaction but for the purpose of secure information exchange in remote possession checking.
Related Content
Dina Darwish.
© 2024.
43 pages.
|
Kassim Kalinaki, Musau Abdullatif, Sempala Abdul-Karim Nasser, Ronald Nsubuga, Julius Kugonza.
© 2024.
23 pages.
|
Yogita Yashveer Raghav, Ramesh Kait.
© 2024.
17 pages.
|
Renuka Devi Saravanan, Shyamala Loganathan, Saraswathi Shunmuganathan.
© 2024.
21 pages.
|
Veera Talukdar, Ardhariksa Zukhruf Kurniullah, Palak Keshwani, Huma Khan, Sabyasachi Pramanik, Ankur Gupta, Digvijay Pandey.
© 2024.
30 pages.
|
Dharmesh Dhabliya, Sukhvinder Singh Dari, Nitin N. Sakhare, Anish Kumar Dhablia, Digvijay Pandey, Balakumar Muniandi, A. Shaji George, A. Shahul Hameed, Pankaj Dadheech.
© 2024.
9 pages.
|
Avtar Singh, Shobhana Kashyap.
© 2024.
11 pages.
|
|
|