Study of Cloud authentication
Keywords:
Security, Organisation,, Technology VODAbstract
Security is one of the most pressing issues in the field of information engineering. It is critical to keep authoritative or client information safe. Moving from traditional technology to cloud engineering is pointless if the information of the organisation is not protected on the cloud. There are a number of nonprofit organisations that are assisting and raising awareness about cloud computing security issues. One such organisation is the Cloud Security Alliance, which publishes a report every year on the most wellknown security vulnerabilities in cloud computing. According to CSA research from 2013, there are eight well-known cloud security threats that might compromise a client's personal information without their knowing.
References
Bergeron, C., Lamy-Bergot, C.: Complaint selective encryption for h.264/avc video streams. In: IEEE 7th Workshop on Multimedia Signal Processing, pp. 1–4 (2005). doi: 10.1109/ MMSP.2005.248641
Cheng, H., Li, X.: Partial encryption of compressed images and videos. IEEE Trans. Signal Process. 48(8), 2439–2451 (2000). doi: 10.1109/78.852023
Chiaraluce, F., Ciccarelli, L., Gambi, E., Pierleoni, P., Reginelli, M.: A new chaotic algorithm for video encryption. IEEE Trans. Consum. Electron. 48(4), 838–844 (2002)
Li, S., Zheng, X., Mou, X., Cai, Y.: Chaotic encryption scheme for real-time digital video. In: Real-Time Imaging VI. Proceedings of SPIE, vol. 4666, pp. 149–160 (2002)
Lian, S., Liu, Z., Ren, Z., Wang, H.: Secure advanced video coding based on selective encryp-tion algorithms. IEEE Trans. Consum. Electron. 52(2), 621–629 (2006)
Lian, S., Liu, Z., Ren, Z., Wang, H.: Commutative encryption and watermarking in video compression. IEEE Trans. Circuits Syst. Video Technol. 17(6), 774–778 (2007)
Logik Bomb: Hacker's Encyclopedia (1997)
Hafner, Katie; Markoff, John (1991). Cyberpunk: Outlaws and Hackers on the Computer Frontier. New York: Simon & Schuster. ISBN 0-671-68322-5.
Sterling, Bruce (1992). The Hacker Crackdown. Bantam. ISBN 0-553-08058-X.
Slatalla, Michelle; Joshua Quittner (1995). Masters of Deception: The Gang That Ruled Cyberspace. HarperCollins. ISBN 0-06-017030-1.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution 4.0 International License.
Re-users must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. This license allows for redistribution, commercial and non-commercial, as long as the original work is properly credited.