Data in Transit Validation for Cloud Computing Using Cloud-Based Algorithm Detection of Injected Objects
The recent paradigm shift in the IT sector leading to cloud computing however innovative had brought along numerous data security concerns. One major such security laps is that referred to as the Man in the Middle (MITM) attack where external data are injected to either hijack a data in transit or t...
Saved in:
Main Authors: | , , , |
---|---|
Format: | EJournal Article |
Published: |
Institute of Advanced Engineering and Science,
2018-04-01.
|
Subjects: | |
Online Access: | Get fulltext |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Internet
Get fulltext3rd Floor Main Library
Call Number: |
A1234.567 |
---|---|
Copy 1 | Available |