Please use this identifier to cite or link to this item:
http://103.99.128.19:8080/xmlui/handle/123456789/413
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Al-Hasan, Md. | - |
dc.contributor.author | Rahman, Mohammad Obaidur | - |
dc.contributor.author | Uddin, Md. Ashraf | - |
dc.date.accessioned | 2024-03-25T07:42:16Z | - |
dc.date.available | 2024-03-25T07:42:16Z | - |
dc.date.issued | 2013-11-21 | - |
dc.identifier.uri | http://103.99.128.19:8080/xmlui/handle/123456789/413 | - |
dc.description.abstract | Cloud computing architecture provides a proper management to share distributed resources and services throughout the world via computer network. This architecture offers three main features, e.g. SaaS, PaaS and IaaS. And today’s Smartphones are more compatible with this architecture, especially with IaaS because of its small storage capacity. Smartphones have become almost computer and these can be viewed as a miniature of personal computer. Since cloud computing share distributed data via network in the open environment so, there may occur security problems. To address this problem, this paper has proposed a new data security approach for Smartphone in cloud computing architecture, which ensures secured communication system and hiding information from others. Security level is maintained using the Global Positioning System (GPS) and network provider which ensures strong user-authentication to secure our cloud. | en_US |
dc.language.iso | en_US | en_US |
dc.publisher | Department of Computer Science and Engineering, CUET | en_US |
dc.relation.ispartofseries | NCICIT; | - |
dc.subject | Cloud Computing | en_US |
dc.subject | Smartphone | en_US |
dc.subject | Data Security | en_US |
dc.subject | RSA | en_US |
dc.subject | El Gamal | en_US |
dc.subject | DES | en_US |
dc.subject | AES | en_US |
dc.title | User-Authentication Approach for Data Security Between Smartphone and Cloud | en_US |
dc.title.alternative | 1st National Conference on Intelligent Computing and Information Technology 2013 | en_US |
dc.title.alternative | NCICIT 2013 | en_US |
dc.type | Article | en_US |
Appears in Collections: | proceedings in CSE |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
User-Authentication Approach for Data Security.pdf | 477.53 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.