Loading...
  • Home
  • Search Results
715-716 of 4327 Papers

PRIVACY ISSUES IN CLOUD COMPUTING FOR PERSONAL AREA NETWORK

Published In: INTERNATIONAL CONFERENCE ON RECENT TRENDS IN COMPUTING AND COMMUNICATION ENGINEERING
Author(s): ANKUR CHAUDHARY , LOKESH KUMAR , NEETI BISHT , SACHIN CHOUDHARY

Abstract: Data security means ensuring that data is kept safe from corruption and that access to it is suitably controlled. It helps in protecting the individual data. This paper focused on cloud data security. Cloud Computing moves the application software and databases to the large data centers, where the management of the data and services are fully trustworthy. The security objectives of an organization are a key factor for decisions about outsourcing information technology services and, in particular, for decisions about transitioning data, applications, and other resources to a public cloud computing environment. The information technology governance practices of the organizations that pertain to the policies, procedures, and standards used for application development and service provisioning, as well as the design, implementation, testing services, should be extended to cloud computing environments. Security and privacy issues are presented in this paper when cloud computing is implemente

  • Publication Date: 21-Apr-2013
  • DOI: 10.15224/978-981-07-6184-4-43
  • Views: 0
  • Downloads: 0

A NOVEL APPROACH FOR INTRODUCING ADVANCED SECURITY IN MOBILE AGENTS

Published In: INTERNATIONAL CONFERENCE ON RECENT TRENDS IN COMPUTING AND COMMUNICATION ENGINEERING
Author(s): ANKUR CHAUHAN , PRIYA SUNEJA , RAJAN SAHOTA

Abstract: Mobile agents can travel autonomously through a computer network in order to perform some computation or gather information on behalf of a human user or an application. With the concept of mobile agent, the execution process will go to the place where the data are available, data will not send to the place of execution process. However, it has not become popular due to some problems such as security, fault tolerance etc. The fact that computers have complete control over all the programs makes it very hard to protect mobile agents from untrusted hosts. So, the issue of protecting a mobile agent from a malicious host is a more difficult problem than protect a host from a malicious agent. This paper proposes advanced security model for the mobile agent security against malicious hosts by combining few techniques so that it can provide a better solution.

  • Publication Date: 21-Apr-2013
  • DOI: 10.15224/978-981-07-6184-4-44
  • Views: 0
  • Downloads: 0