scholarly journals Implementation of Chunks of Image Password in Cloud Computing System

2019 ◽  
Vol 8 (S1) ◽  
pp. 54-57
Author(s):  
V. Sulochana

This article proposed a graphical password authentication which uses chunks of images to overcome the loopholes present in the traditional authentication methods. The graphical password contains a selection of chunks of images which creates password for authenticating cloud users for accessing cloud services. The article includes the details of chunks of images authentication, algorithm and implementation of chunk of images.

2020 ◽  
Vol 9 (1) ◽  
pp. 13-17
Author(s):  
B. Rasina Begum ◽  
P. Chithra

Cloud computing provides a scalable platform for growing amount of data and processes that work on various applications and services by means of on-demand service providing. The storage services offered by clouds have become a new profit growth by providing a comparably cheapest, scalable, location-independent platform for managing users’ data. Client uses the cloud storage and enjoys the high-quality applications and services from a shared pool of configurable computing resources using cloud services. It reduces the trouble of local data storage and maintenance. But it gives severe security threats toward users’ outsourced data. Maintaining the log record securely over extended period is very crucial to the proper functioning of any organization. Log holds the record of system events specially user activities. It is the main target for malicious attackers. An attacker, breaking into a system would not try to leave traces of his or her activities behind. This proposed work mainly concentrates on the problem of log security in cloud computing system and using fully homomorphism encryption algorithm in the cloud computing log data.


Author(s):  
Merita Kasa Halili ◽  
Betim Cico

<p class="0abstract">Cloud Computing conducts application, infrastructure services or platform to a very large amount of users with more choices and continuous changing requirements. Cloud providers are occupied in organizing data warehouses to arrange the continuous growth in cloud user’s acceptance. Features of cloud computing services have afforded an important tendency of companies choosing these services. In this case, many cloud users, who intend a certain service, and many cloud providers, who provision those services, create a competitive market. When constructing a Cloud scheduling scheme, the project trade-offs of the Cloud architecture should be rated. The simplest manner to rate this infrastructure is to use a simulation tool called CloudSim simulation toolkit. To reduce/avoid SLA violations in the cloud computing system, in our work we propose a SLA reduction framework in which we have considered three steps: Migration control of VMs, Energy efficiency and VmScheduling. It is also implemented in Cloudsimulator.</p>


2010 ◽  
Vol 20 (5) ◽  
pp. 1337-1348 ◽  
Author(s):  
Kang CHEN ◽  
Wei-Min ZHENG

Sign in / Sign up

Export Citation Format

Share Document