Study of Cloud authentication

Authors

  • Mohit Malik

Keywords:

Security, Organisation,, Technology VOD

Abstract

Security is one of the most pressing issues in the field of information engineering. It is critical to keep authoritative or client information safe. Moving from traditional technology to cloud engineering is pointless if the information of the organisation is not protected on the cloud. There are a number of nonprofit organisations that are assisting and raising awareness about cloud computing security issues. One such organisation is the Cloud Security Alliance, which publishes a report every year on the most wellknown security vulnerabilities in cloud computing. According to CSA research from 2013, there are eight well-known cloud security threats that might compromise a client's personal information without their knowing.

References

Bergeron, C., Lamy-Bergot, C.: Complaint selective encryption for h.264/avc video streams. In: IEEE 7th Workshop on Multimedia Signal Processing, pp. 1–4 (2005). doi: 10.1109/ MMSP.2005.248641

Cheng, H., Li, X.: Partial encryption of compressed images and videos. IEEE Trans. Signal Process. 48(8), 2439–2451 (2000). doi: 10.1109/78.852023

Chiaraluce, F., Ciccarelli, L., Gambi, E., Pierleoni, P., Reginelli, M.: A new chaotic algorithm for video encryption. IEEE Trans. Consum. Electron. 48(4), 838–844 (2002)

Li, S., Zheng, X., Mou, X., Cai, Y.: Chaotic encryption scheme for real-time digital video. In: Real-Time Imaging VI. Proceedings of SPIE, vol. 4666, pp. 149–160 (2002)

Lian, S., Liu, Z., Ren, Z., Wang, H.: Secure advanced video coding based on selective encryp-tion algorithms. IEEE Trans. Consum. Electron. 52(2), 621–629 (2006)

Lian, S., Liu, Z., Ren, Z., Wang, H.: Commutative encryption and watermarking in video compression. IEEE Trans. Circuits Syst. Video Technol. 17(6), 774–778 (2007)

Logik Bomb: Hacker's Encyclopedia (1997)

Hafner, Katie; Markoff, John (1991). Cyberpunk: Outlaws and Hackers on the Computer Frontier. New York: Simon & Schuster. ISBN 0-671-68322-5.

Sterling, Bruce (1992). The Hacker Crackdown. Bantam. ISBN 0-553-08058-X.

Slatalla, Michelle; Joshua Quittner (1995). Masters of Deception: The Gang That Ruled Cyberspace. HarperCollins. ISBN 0-06-017030-1.

Downloads

Published

30-09-2021

How to Cite

Malik, M. (2021). Study of Cloud authentication . International Journal for Research Publication and Seminar, 12(3), 8–15. Retrieved from https://jrps.shodhsagar.com/index.php/j/article/view/137

Issue

Section

Original Research Article