Keyless Signature Infrastructure Solution for Cloud Attacks
International Journal of Engineering & Technology, 7 (2.33) (2018) 513-514
2 Pages Posted: 20 May 2019
Date Written: January 1, 2018
Abstract
Keyless Signature Infrastructure (KSI) is a procedure that is used to distribute and verify the signature; only hash function cryptography is being used in this method. KSI uses block chain technology for the signing and verification of the signature. The paper will discuss the solution of different cloud attacks using Keyless Signature Infrastructure.
Keywords: Cloud Attacks; Block Chain; Markle Tree
Suggested Citation: Suggested Citation
Chandran, Remya and Sasi Kumar, A. and Sasi Kumar, A., Keyless Signature Infrastructure Solution for Cloud Attacks (January 1, 2018). International Journal of Engineering & Technology, 7 (2.33) (2018) 513-514, Available at SSRN: https://ssrn.com/abstract=3374740
Do you have negative results from your research you’d like to share?
Feedback
Feedback to SSRN
If you need immediate assistance, call 877-SSRNHelp (877 777 6435) in the United States, or +1 212 448 2500 outside of the United States, 8:30AM to 6:00PM U.S. Eastern, Monday - Friday.