Keyless Signature Infrastructure Solution for Cloud Attacks

International Journal of Engineering & Technology, 7 (2.33) (2018) 513-514

2 Pages Posted: 20 May 2019

See all articles by Remya Chandran

Remya Chandran

VELS Institute of Science, Technology & Advanced Studies (Formerly VELS University) - School of Computing Sciences

A. Sasi Kumar

Vels Institute of Science, Technology and Advanced Studies (Deemed to be University); Anna University - Madras Institute of Technology

Date Written: January 1, 2018

Abstract

Keyless Signature Infrastructure (KSI) is a procedure that is used to distribute and verify the signature; only hash function cryptography is being used in this method. KSI uses block chain technology for the signing and verification of the signature. The paper will discuss the solution of different cloud attacks using Keyless Signature Infrastructure.

Keywords: Cloud Attacks; Block Chain; Markle Tree

Suggested Citation

Chandran, Remya and Sasi Kumar, A. and Sasi Kumar, A., Keyless Signature Infrastructure Solution for Cloud Attacks (January 1, 2018). International Journal of Engineering & Technology, 7 (2.33) (2018) 513-514, Available at SSRN: https://ssrn.com/abstract=3374740

Remya Chandran

VELS Institute of Science, Technology & Advanced Studies (Formerly VELS University) - School of Computing Sciences ( email )

Chennai, Tamil Nadu 600 117
India

A. Sasi Kumar (Contact Author)

Vels Institute of Science, Technology and Advanced Studies (Deemed to be University) ( email )

Pallavaram, Chennai - 600117
Tamil Nadu
India

Anna University - Madras Institute of Technology ( email )

Chennai, Tamilnadu
India

Do you have negative results from your research you’d like to share?

Paper statistics

Downloads
146
Abstract Views
641
Rank
360,858
PlumX Metrics