A new approach for improving security in cloud computing / Heba Mohamed Sabri Hafez ; Supervised Nashaat Elkhameesy , Hesham Ahmed Hefny
Material type: TextLanguage: English Publication details: Cairo : Heba Mohamed Sabri Hafez , 2016Description: 126 Leaves : facsimiles ; 30cmOther title:- اسلوب جديد لتحسين الأمن فى الحوسبة السحابية [Added title page title]
- Issued also as CD
Item type | Current library | Home library | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
Thesis | قاعة الرسائل الجامعية - الدور الاول | المكتبة المركزبة الجديدة - جامعة القاهرة | Cai01.18.02.Ph.D.2016.He.N (Browse shelf(Opens below)) | Not for loan | 01010110071395000 | |||
CD - Rom | مخـــزن الرســائل الجـــامعية - البدروم | المكتبة المركزبة الجديدة - جامعة القاهرة | Cai01.18.02.Ph.D.2016.He.N (Browse shelf(Opens below)) | 71395.CD | Not for loan | 01020110071395000 |
Thesis (Ph.D.) - Cairo University - Institute of Statistical Studies and Research - Department of Computer and Information Science
A cloud service is any combination of IT resources, such as network accessible data storage and processing, fully featured applications, and software development and deployment tools that are offered for consumption by cloud provider. The provider maintains shared pools of the IT resources which are made available to the consumers as services over a network. Although there are many benefits to adopting cloud computing, there are also some significant barriers to adoption. One of the most significant barriers to adoption is security, followed by issues regarding compliance, privacy and legal matters. Because cloud computing represents a relatively new computing model that provide essential services, which these services are often outsourced to a third party, which makes it harder to maintain data security and privacy, support data and service availability, and demonstrate compliance. There is a great deal of uncertainty about how security at all levels (e.g., network, host, application, and data levels) can be achieved and how applications security is moved to cloud computing. Identity management and access control are fundamental functions required for securing cloud computing. Biometric system is used for one of two tasks: identification or authentication. The authentication task tries to validate the identity of a user based on his/her physiological or behavioral traits. Authentication task is already used for local authentication purposes (i.e. private use), while its use on the Internet is still relatively modes. Cloud authentication is related to user{u2019}s identity and therefore gain a level of trust of user and different IT industry and organizations which adopt the cloud services. Cloud computing integrated with biometric assurance will provide more reliable service
Issued also as CD
There are no comments on this title.