This book describes the implementation of algorithms for providing security and privacy in cloud-based services. The goal is to avoid the various attacks and to identify a better route to transfer the data securely in the cloud environment. The main objective is to design a proactive approach to ensure valid client authentication by the cloud provider. A Two Factor Authentication (TFA) scheme is proposed based on the One Time Password (OTP) which is generated and sent to authorized users through the mail. Accessing the data in cloud environment is done by the client through authentication, authorization, and integrity. HMAC authentication algorithm is proposed for Network as a Service (NaaS) in the cloud environment to design a secured data transmission through Open Shortest Path First (OSPF) routing protocol. To ensure confidentiality in cloud services, a hybrid mechanism is proposed using symmetric and asymmetric cryptography in SaaS and NaaS environments. Authentication and integrity are tested by implementing HMAC with OSPF protocol and various statistical measures like Clock offset, root delay, root dispersion, and peer dispersion of the time is calculated.
"Sinopsis" puede pertenecer a otra edición de este libro.
EUR 11,00 gastos de envío desde Alemania a España
Destinos, gastos y plazos de envíoLibrería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania
Taschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book describes the implementation of algorithms for providing security and privacy in cloud-based services. The goal is to avoid the various attacks and to identify a better route to transfer the data securely in the cloud environment. The main objective is to design a proactive approach to ensure valid client authentication by the cloud provider. A Two Factor Authentication (TFA) scheme is proposed based on the One Time Password (OTP) which is generated and sent to authorized users through the mail. Accessing the data in cloud environment is done by the client through authentication, authorization, and integrity. HMAC authentication algorithm is proposed for Network as a Service (NaaS) in the cloud environment to design a secured data transmission through Open Shortest Path First (OSPF) routing protocol. To ensure confidentiality in cloud services, a hybrid mechanism is proposed using symmetric and asymmetric cryptography in SaaS and NaaS environments. Authentication and integrity are tested by implementing HMAC with OSPF protocol and various statistical measures like Clock offset, root delay, root dispersion, and peer dispersion of the time is calculated. 108 pp. Englisch. Nº de ref. del artículo: 9786203042016
Cantidad disponible: 2 disponibles
Librería: AHA-BUCH GmbH, Einbeck, Alemania
Taschenbuch. Condición: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - This book describes the implementation of algorithms for providing security and privacy in cloud-based services. The goal is to avoid the various attacks and to identify a better route to transfer the data securely in the cloud environment. The main objective is to design a proactive approach to ensure valid client authentication by the cloud provider. A Two Factor Authentication (TFA) scheme is proposed based on the One Time Password (OTP) which is generated and sent to authorized users through the mail. Accessing the data in cloud environment is done by the client through authentication, authorization, and integrity. HMAC authentication algorithm is proposed for Network as a Service (NaaS) in the cloud environment to design a secured data transmission through Open Shortest Path First (OSPF) routing protocol. To ensure confidentiality in cloud services, a hybrid mechanism is proposed using symmetric and asymmetric cryptography in SaaS and NaaS environments. Authentication and integrity are tested by implementing HMAC with OSPF protocol and various statistical measures like Clock offset, root delay, root dispersion, and peer dispersion of the time is calculated. Nº de ref. del artículo: 9786203042016
Cantidad disponible: 1 disponibles
Librería: moluna, Greven, Alemania
Condición: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Krishna B. HariBommala Harikrishna received his Ph.D. degree in Computer Science and Engineering from Yogi Vemana University, Kadapa, A.P, India. He is a reviewer member for many Springer, Elsevier, IEEE, and UGC care list journals. . Nº de ref. del artículo: 452571906
Cantidad disponible: Más de 20 disponibles
Librería: Books Puddle, New York, NY, Estados Unidos de America
Condición: New. Nº de ref. del artículo: 26397296042
Cantidad disponible: 4 disponibles
Librería: Majestic Books, Hounslow, Reino Unido
Condición: New. Print on Demand. Nº de ref. del artículo: 400162421
Cantidad disponible: 4 disponibles
Librería: buchversandmimpf2000, Emtmannsberg, BAYE, Alemania
Taschenbuch. Condición: Neu. Neuware -This book describes the implementation of algorithms for providing security and privacy in cloud-based services. The goal is to avoid the various attacks and to identify a better route to transfer the data securely in the cloud environment. The main objective is to design a proactive approach to ensure valid client authentication by the cloud provider. A Two Factor Authentication (TFA) scheme is proposed based on the One Time Password (OTP) which is generated and sent to authorized users through the mail. Accessing the data in cloud environment is done by the client through authentication, authorization, and integrity. HMAC authentication algorithm is proposed for Network as a Service (NaaS) in the cloud environment to design a secured data transmission through Open Shortest Path First (OSPF) routing protocol. To ensure confidentiality in cloud services, a hybrid mechanism is proposed using symmetric and asymmetric cryptography in SaaS and NaaS environments. Authentication and integrity are tested by implementing HMAC with OSPF protocol and various statistical measures like Clock offset, root delay, root dispersion, and peer dispersion of the time is calculated.Books on Demand GmbH, Überseering 33, 22297 Hamburg 108 pp. Englisch. Nº de ref. del artículo: 9786203042016
Cantidad disponible: 2 disponibles
Librería: Biblios, Frankfurt am main, HESSE, Alemania
Condición: New. PRINT ON DEMAND. Nº de ref. del artículo: 18397296032
Cantidad disponible: 4 disponibles