Loading…
SECURE AUTHENTICATION OF CLOUD DATA MINING API
Unaware of this, user may allow public access to the API leading to a security breach. [...]we see that security remains an ongoing concern in cloud deployments [6][42]. Data mining and warehousing techniques targeted to applications such as: fraud detection, prediction of potential threats, identif...
Saved in:
Published in: | Acta Technica Corvininesis 2014-01, Vol.7 (1), p.183 |
---|---|
Main Authors: | , , , |
Format: | Article |
Language: | English |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Unaware of this, user may allow public access to the API leading to a security breach. [...]we see that security remains an ongoing concern in cloud deployments [6][42]. Data mining and warehousing techniques targeted to applications such as: fraud detection, prediction of potential threats, identification of criminal suspects etc. are being used in cloud computing scenarios. None of the stored informationis considered to be sensitive to security. [...]the "one time pass word"[2] system is suitable for authentication in this scenarios wherein the Client side API user procedure is considered not to be trusted or is vulnerable to compromise. |
---|---|
ISSN: | 2067-3809 |