INVESTIGATION INTO SECURITY LOOP HOLES OF CLOUD SERVER AND SOLUTION USING MULTI LAYER SECURITY MECHANISM

Authors

  • Preeti Lohan Research Scholar, Department of CSE, IITB College, Sonipat
  • Ritika Saroha Assistant Prof. Department – CSE, Department of CSE, IITB College, Sonipat

Keywords:

Technology, Multimedia, Organization, Partnership

Abstract

Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure and economical. The motivation for cloud computing was initially driven by large scale resource intensive government application, that require more computational, network and storage resources then a single computer, cloud provides in a single administrative domain. Cloud Server is giving importance to its digital collections of multimedia data. The multimedia data are becoming main source of information in a library and the preferred mode of acquisition for collection development. Research studies reveal that any authentication mechanism related to web applications and cloud should provide high security, easy to use interface and support user mobility. Customers prefer to access their applications from different locations and different devices such as desktop, laptop, PDA, smart phones, cell phones etc.

References

Agi, I., Gong, L.: An empirical study of secure mpeg video transmissions. In: Proceedings of the Symposium on Network and Distributed System Security, pp. 137–144. IEEE Press, New York (1996)

Baugher, M., McGrew, D., Naslund, M., Carrara, E., Norrman, K.: The secure real-time trans-port protocol (SRTP) (2004)

Bergeron, C., Lamy-Bergot, C.: Complaint selective encryption for h.264/avc video streams. In: IEEE 7th Workshop on Multimedia Signal Processing, pp. 1–4 (2005). doi: 10.1109/ MMSP.2005.248641

Cheng, H., Li, X.: Partial encryption of compressed images and videos. IEEE Trans. Signal Process. 48(8), 2439–2451 (2000). doi: 10.1109/78.852023

Chiaraluce, F., Ciccarelli, L., Gambi, E., Pierleoni, P., Reginelli, M.: A new chaotic algorithm for video encryption. IEEE Trans. Consum. Electron. 48(4), 838–844 (2002)

Li, S., Zheng, X., Mou, X., Cai, Y.: Chaotic encryption scheme for real-time digital video. In: Real-Time Imaging VI. Proceedings of SPIE, vol. 4666, pp. 149–160 (2002)

Lian, S., Liu, Z., Ren, Z., Wang, H.: Secure advanced video coding based on selective encryp-tion algorithms. IEEE Trans. Consum. Electron. 52(2), 621–629 (2006)

Lian, S., Liu, Z., Ren, Z., Wang, H.: Commutative encryption and watermarking in video compression. IEEE Trans. Circuits Syst. Video Technol. 17(6), 774–778 (2007)

Logik Bomb: Hacker's Encyclopedia (1997)

Hafner, Katie; Markoff, John (1991). Cyberpunk: Outlaws and Hackers on the Computer Frontier. New York: Simon & Schuster. ISBN 0-671-68322-5.

Downloads

Published

30-09-2016

How to Cite

Preeti Lohan, & Ritika Saroha. (2016). INVESTIGATION INTO SECURITY LOOP HOLES OF CLOUD SERVER AND SOLUTION USING MULTI LAYER SECURITY MECHANISM. International Journal for Research Publication and Seminar, 7(7), 6–11. Retrieved from https://jrps.shodhsagar.com/index.php/j/article/view/929

Issue

Section

Original Research Article