Open Access   Article Go Back

Cloud`s SaaS Security by Biometric Concept

D. Singh1 , S. Shukla2

Section:Review Paper, Product Type: Journal Paper
Volume-2 , Issue-2 , Page no. 70-73, Feb-2014

Online published on Feb 28, 2014

Copyright © D. Singh, S. Shukla . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: D. Singh, S. Shukla, “Cloud`s SaaS Security by Biometric Concept,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.2, pp.70-73, 2014.

MLA Style Citation: D. Singh, S. Shukla "Cloud`s SaaS Security by Biometric Concept." International Journal of Computer Sciences and Engineering 2.2 (2014): 70-73.

APA Style Citation: D. Singh, S. Shukla, (2014). Cloud`s SaaS Security by Biometric Concept. International Journal of Computer Sciences and Engineering, 2(2), 70-73.

BibTex Style Citation:
@article{Singh_2014,
author = {D. Singh, S. Shukla},
title = {Cloud`s SaaS Security by Biometric Concept},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2014},
volume = {2},
Issue = {2},
month = {2},
year = {2014},
issn = {2347-2693},
pages = {70-73},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=55},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=55
TI - Cloud`s SaaS Security by Biometric Concept
T2 - International Journal of Computer Sciences and Engineering
AU - D. Singh, S. Shukla
PY - 2014
DA - 2014/02/28
PB - IJCSE, Indore, INDIA
SP - 70-73
IS - 2
VL - 2
SN - 2347-2693
ER -

VIEWS PDF XML
3528 3453 downloads 3641 downloads
  
  
           

Abstract

Personal privacy is of utmost importance in the global networked world. Some vital information that are disseminated within an office, across offices ,between branches, of an organization and other external bodies and establishments at times get into the hands of the unauthorized persons who may tamper with that contents of the information. And if no security measures are taken, there is no doubt that such data and other sensitive information will be exposed to threats such as impersonation, in-secrecy, corruption, repudiation, break-in or denial of services that may cause serious danger on the individual or organization. A secure system should maintain the integrity, availability, and privacy of data. Data integrity usually means protection from unauthorized modification, resistance to penetration and protection from undetected modification.

Key-Words / Index Term

Cloud Computing, Security, SLA, VPN, Biometric Security

References

[1]. Zirra Peter Buba, Gregory Maksha Wajiga,�Cryptographic Algoriths for Secure Data Communication�;International Journal of Computer Science and Security(IJCSS), Volume(5) :Issue(2) :2011.
[2]. www.wikipedia.com
[3]. Hassan Takabi, James B. D. Joshi, Gail-Joon �Security and Privacy Challenges in Cloud Computing Environments�1540-7993/10/IEEE.
[4]. Richard Chow, Philippe Golle, Markus Jakobsson, Elaine Shi, Jessica Stanndon, Ryusuke Masuoka, Jesus Molina�Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Cloud �.
[5]. Alexa Huth and James Cebula�The Basics of Cloud Computing�USCERT 2011.