Providing Data Protection as a Service in Cloud Computing
@inproceedings{Cherian2013ProvidingDP, title={Providing Data Protection as a Service in Cloud Computing}, author={Sunumol Cherian and Kavitha Murukezhan}, year={2013} }
Data protection in cloud has become an unavoidable and tremendously increasing technology. [...] Key Method User authentication is provided using alphanumeric password and graphical password, security is provided using encryption of the file using key. Key management is an important concept used for the protection of data. Overall transactions are viewed by an auditor. Here multilevel data protection is guaranteed for the cloud users.Expand Abstract
Figures and Topics from this paper
Figures
7 Citations
References
SHOWING 1-10 OF 66 REFERENCES
Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection
- Computer Science
- HotOS
- 2011
- 53
- PDF
Robust discretization, with an application to graphical passwords
- Computer Science
- IACR Cryptol. ePrint Arch.
- 2003
- 77
- PDF
Earrthworm diversity and habitat preferences in arid regions of Rajasthan
- Biology
- 2004
- 26
- Highly Influential
- PDF
Earthworms (Oligochaeta) from islands of the south-western Pacific, and a note on two species from Papua New Guinea
- Biology
- 1984
- 34
Population dynamics of earthworms (Oligochaeta) in cultivated soils of central Himalayan tarai region
- Biology
- 2003
- 16
- PDF
Earthworms from northern Indian states with Ocnerodrilus occidentalis Eisen, 1878 as a new report from Punjab
- Biology
- 2005
- 8
- Highly Influential
- PDF