Digital Library
Close Browse articles from a journal
 
<< previous    next >>
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
           All articles of the corresponding issues
                                       Details for article 104 of 122 found articles
 
 
  SECURING VIRTUAL IMAGES USING BLIND AUTHENTICATION PROTOCOL
 
 
Title: SECURING VIRTUAL IMAGES USING BLIND AUTHENTICATION PROTOCOL
Author: RAVIKIRAN PEELUKHANA,
SHANTHI BALA P,
AGHILA G
Appeared in: International journal of engineering science and technology
Paging: Volume 3 (2011) nr. 4 pages 2857-2864
Year: 2011
Contents: The cloud virtualization technology improves the economy of scale for data centers through server consolidation, application consolidation and resources consolidation. Virtualization allows the provider to move Virtual Images from more congested host to less-congested hosts, as required. Enterprises also get improved server reliability, which in turn increases application performance. Despite these benefits, it includes major security challenges with the portability of Virtual Images between different cloud providers.The security and integrity of Virtual images is the foundation for the overall security of the cloud. Many of the Virtual images are intended to be shared by diverse and unrelated users. Unfortunately, existing approaches to cloud security built by cloud practitioners fall short when dealing with Virtual images. Secure transmission of virtual Images can bepossible by providing authentication using Blind Authentication protocol (BAP). The proposed approach authenticates the allocation of virtual images using Blind authentication protocol. It provides provable protection against replay and client side attacks even if the keys of the user are compromised. The encryption also provides template protection, revocability and alleviates the concerns on privacy in widespread use of biometrics. Carrying out the authentication in the encrypted domain is a secure process, while the encryption key acts as an additional layer of security.
Publisher: Engg Journals Publication (provided by DOAJ)
Source file: Elektronische Wetenschappelijke Tijdschriften
 
 

                             Details for article 104 of 122 found articles
 
<< previous    next >>
 
 Koninklijke Bibliotheek - National Library of the Netherlands