Loading…

SECURE AUTHENTICATION OF CLOUD DATA MINING API

Unaware of this, user may allow public access to the API leading to a security breach. [...]we see that security remains an ongoing concern in cloud deployments [6][42]. Data mining and warehousing techniques targeted to applications such as: fraud detection, prediction of potential threats, identif...

Full description

Saved in:
Bibliographic Details
Published in:Acta Technica Corvininesis 2014-01, Vol.7 (1), p.183
Main Authors: Bhadauria, Rohit, Borgohain, Rajdeep, Biswas, Abirlal, Sanyal, Sugata
Format: Article
Language:English
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Unaware of this, user may allow public access to the API leading to a security breach. [...]we see that security remains an ongoing concern in cloud deployments [6][42]. Data mining and warehousing techniques targeted to applications such as: fraud detection, prediction of potential threats, identification of criminal suspects etc. are being used in cloud computing scenarios. None of the stored informationis considered to be sensitive to security. [...]the "one time pass word"[2] system is suitable for authentication in this scenarios wherein the Client side API user procedure is considered not to be trusted or is vulnerable to compromise.
ISSN:2067-3809