Security

3-Layer Security Using Face Recognition Layer Recognition in Cloud

Free registration required

Executive Summary

In cloud computing databases are the centralized large data centers, where the management of the data and services may not be fully trust worthy which is provided by large amount of computing and storage to customers provisioned as a service over the internet. Due lack of proper security and weakness in safeguard which lead to many vulnerability in cloud computing. This paper has been written to focus on the problem of data leakage. In first phase which is known as Data classification the classification of data is done by client before storing it. During this phase the data is to be categorized on the basis of CIA (Confidentiality, Integrity, and Availability).

  • Format: PDF
  • Size: 164.6 KB