THE MAIN ASPECTS OF DATA SECURITY IN CLOUD COMPUTING
Published In: 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, ELECTRONICS AND COMMUNICATION
Author(s): ZUZANA PRISCAKOVA , IVANA RABOVA
Abstract: Cloud computing is a modern trend in information technologies. Implementation of the cloud is associated with data security. Data security includes phishing, provider personnel with privileged access, data origin and lineage. Another security aspect is determination of data categorization. In this article we point to two ways for data categorization. The aim of this paper is to determine the safety aspects based on the special security points. We set user login, encryption and data security, risks and data integrity as the main aspects. These aspects we summarized in nondeterministic finite automaton. We determined a new methodology of security using automaton.
- Publication Date: 26-Oct-2014
- DOI: 10.15224/978-1-63248-029-3-66
- Views: 0
- Downloads: 0
AN EFFICIENT MANAGEMENT SCHEDULING FOR RAPID DATA TRAVERSE IN WIRELESS SENSOR NETWORK
Published In: 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, ELECTRONICS AND COMMUNICATION
Author(s): S. DIWAKARAN
Abstract: A wireless sensor network is a collection of nodes organized into a cooperative network. It comprising of spatially appropriated self-ruling mechanisms utilizing sensors to screen physical or ecological conditions. Now a day’s wireless sensor network is applied in many applications like military, nuclear power plant. In those applications data transmission rate should be in higher manner and the data transmission time should be very lower and all the nodes are in the cluster should be very secure also. For that single source shortest path algorithm – Dijkstra’s algorithm is used , from this algorithm the intermediate node between the sender and the sink node will be reduced and the data path will be reduced and the data transmission time will be reduced .If the node and the cluster is not secure the sensed data will be read by some of the intruder. For secure our cluster three tier security scheme is used. In this security scheme the node, cluster head, sink node are having their own k
- Publication Date: 26-Oct-2014
- DOI: 10.15224/978-1-63248-029-3-67
- Views: 0
- Downloads: 0