Please use this identifier to cite or link to this item: http://103.99.128.19:8080/xmlui/handle/123456789/413
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAl-Hasan, Md.-
dc.contributor.authorRahman, Mohammad Obaidur-
dc.contributor.authorUddin, Md. Ashraf-
dc.date.accessioned2024-03-25T07:42:16Z-
dc.date.available2024-03-25T07:42:16Z-
dc.date.issued2013-11-21-
dc.identifier.urihttp://103.99.128.19:8080/xmlui/handle/123456789/413-
dc.description.abstractCloud computing architecture provides a proper management to share distributed resources and services throughout the world via computer network. This architecture offers three main features, e.g. SaaS, PaaS and IaaS. And today’s Smartphones are more compatible with this architecture, especially with IaaS because of its small storage capacity. Smartphones have become almost computer and these can be viewed as a miniature of personal computer. Since cloud computing share distributed data via network in the open environment so, there may occur security problems. To address this problem, this paper has proposed a new data security approach for Smartphone in cloud computing architecture, which ensures secured communication system and hiding information from others. Security level is maintained using the Global Positioning System (GPS) and network provider which ensures strong user-authentication to secure our cloud.en_US
dc.language.isoen_USen_US
dc.publisherDepartment of Computer Science and Engineering, CUETen_US
dc.relation.ispartofseriesNCICIT;-
dc.subjectCloud Computingen_US
dc.subjectSmartphoneen_US
dc.subjectData Securityen_US
dc.subjectRSAen_US
dc.subjectEl Gamalen_US
dc.subjectDESen_US
dc.subjectAESen_US
dc.titleUser-Authentication Approach for Data Security Between Smartphone and Clouden_US
dc.title.alternative1st National Conference on Intelligent Computing and Information Technology 2013en_US
dc.title.alternativeNCICIT 2013en_US
dc.typeArticleen_US
Appears in Collections:proceedings in CSE

Files in This Item:
File Description SizeFormat 
User-Authentication Approach for Data Security.pdf477.53 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.