Cloud`s SaaS Security by Biometric Concept
D. Singh1 , S. Shukla2
Section:Review Paper, Product Type: Journal Paper
Volume-2 ,
Issue-2 , Page no. 70-73, Feb-2014
Online published on Feb 28, 2014
Copyright © D. Singh, S. Shukla . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: D. Singh, S. Shukla, “Cloud`s SaaS Security by Biometric Concept,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.2, pp.70-73, 2014.
MLA Style Citation: D. Singh, S. Shukla "Cloud`s SaaS Security by Biometric Concept." International Journal of Computer Sciences and Engineering 2.2 (2014): 70-73.
APA Style Citation: D. Singh, S. Shukla, (2014). Cloud`s SaaS Security by Biometric Concept. International Journal of Computer Sciences and Engineering, 2(2), 70-73.
BibTex Style Citation:
@article{Singh_2014,
author = {D. Singh, S. Shukla},
title = {Cloud`s SaaS Security by Biometric Concept},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2014},
volume = {2},
Issue = {2},
month = {2},
year = {2014},
issn = {2347-2693},
pages = {70-73},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=55},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=55
TI - Cloud`s SaaS Security by Biometric Concept
T2 - International Journal of Computer Sciences and Engineering
AU - D. Singh, S. Shukla
PY - 2014
DA - 2014/02/28
PB - IJCSE, Indore, INDIA
SP - 70-73
IS - 2
VL - 2
SN - 2347-2693
ER -
VIEWS | XML | |
3653 | 3497 downloads | 3734 downloads |
Abstract
Personal privacy is of utmost importance in the global networked world. Some vital information that are disseminated within an office, across offices ,between branches, of an organization and other external bodies and establishments at times get into the hands of the unauthorized persons who may tamper with that contents of the information. And if no security measures are taken, there is no doubt that such data and other sensitive information will be exposed to threats such as impersonation, in-secrecy, corruption, repudiation, break-in or denial of services that may cause serious danger on the individual or organization. A secure system should maintain the integrity, availability, and privacy of data. Data integrity usually means protection from unauthorized modification, resistance to penetration and protection from undetected modification.
Key-Words / Index Term
Cloud Computing, Security, SLA, VPN, Biometric Security
References
[1]. Zirra Peter Buba, Gregory Maksha Wajiga,�Cryptographic Algoriths for Secure Data Communication�;International Journal of Computer Science and Security(IJCSS), Volume(5) :Issue(2) :2011.
[2]. www.wikipedia.com
[3]. Hassan Takabi, James B. D. Joshi, Gail-Joon �Security and Privacy Challenges in Cloud Computing Environments�1540-7993/10/IEEE.
[4]. Richard Chow, Philippe Golle, Markus Jakobsson, Elaine Shi, Jessica Stanndon, Ryusuke Masuoka, Jesus Molina�Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Cloud �.
[5]. Alexa Huth and James Cebula�The Basics of Cloud Computing�USCERT 2011.