Cloud Security Using SAP- Shared Authentication Protocol

Download Now
Provided by: International Journal of Computer Science and Mobile Computing (IJCSMC)
Topic: Security
Format: PDF
In the cloud computing users (information owners host their information on cloud servers and other users (data consumers) will access the information from cloud servers. During such data accessing, the data sharing between different users is significant to have business or commercial productive benefits. In providing such sharing existing security solutions mainly focus on authentication so as prevent unauthorized access to users' private data, but concerns nothing about the privacy of user when user challenges the cloud server for other user's data.
Download Now

Find By Topic