首页> 外文会议>2017 4th International Conference on Signal Processing, Computing and Control >Review on various authentication scheme over cloud computing
【24h】

Review on various authentication scheme over cloud computing

机译:回顾云计算的各种认证方案

获取原文
获取原文并翻译 | 示例

摘要

Cloud computing is basically excogitated from the word internet, which is an advance technology. Cloud computing enables us to access services and infrastructure over the cloud through internet and also permits secure sharing of resources. The use of computing resources as a service with the help of internet is called Cloud Computing. It has started to gain vision in corporate data centers. In recent years, cloud computing is including grid computing because utilization of virtualization at data center could increase. With increase in the number of user and data, there is a need of data confidentiality as well as authenticity of users connected to the cloud so as to protect them from each other as well as from the hackers too.
机译:云计算基本上是从互联网这一先进技术中脱颖而出的。云计算使我们能够通过Internet通过云访问服务和基础架构,并允许安全地共享资源。在互联网的帮助下将计算资源用作服务称为云计算。它已开始在企业数据中心中获得视野。近年来,云计算包括网格计算,因为数据中心的虚拟化利用率可能会提高。随着用户和数据数量的增加,需要数据机密性以及连接到云的用户的真实性,以保护他们彼此之间以及与黑客之间。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号