Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects
The recent paradigm shift in the IT sector leading to cloud computing however innovative had brought along numerous data security concerns. One major such security laps is that referred to as the Man in the Middle (MITM) attack where external data are injected to either hijack a data in transit o...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English English |
Published: |
Institute of Advanced Engineering and Science (IAES)
2018
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/64152/ http://irep.iium.edu.my/64152/ http://irep.iium.edu.my/64152/ http://irep.iium.edu.my/64152/1/64152_Data%20in%20transit%20validation%20for%20cloud%20computing_article.pdf http://irep.iium.edu.my/64152/2/64152_Data%20in%20transit%20validation%20for%20cloud%20computing_scopus.pdf |
Internet
http://irep.iium.edu.my/64152/http://irep.iium.edu.my/64152/
http://irep.iium.edu.my/64152/
http://irep.iium.edu.my/64152/1/64152_Data%20in%20transit%20validation%20for%20cloud%20computing_article.pdf
http://irep.iium.edu.my/64152/2/64152_Data%20in%20transit%20validation%20for%20cloud%20computing_scopus.pdf