S. Subashini's research while affiliated with Anna University of Technology Tirunelveli and other places

Publications (5)

Article
Cloud computing is a flexible, cost effective and proven delivery platform for providing business or consumer IT services over the Internet. Despite of all the hype surrounding the cloud, enterprise customers are still reluctant to deploy their business in the cloud. This study proposes a security framework that provides security as a service for c...
Conference Paper
IT Enterprises are migrating to the Cloud environment at a faster pace. Though Cloud Computing is quickly evolving as the next generation architecture for enterprises, there are astounding issues with this environment that will pop up as more and more applications and data move into the cloud. Security of information that is being processed by the...
Article
Cloud computing is a way to increase the capacity or add capabilities dynamically without investing in new infrastructure, training new personnel, or licensing new software. It extends Information Technology’s (IT) existing capabilities. In the last few years, cloud computing has grown from being a promising business concept to one of the fast grow...

Citations

... For the most part, the cloud service provider is responsible for security function. Subashini & Kavitha (2011) identify 13 security elements that need to be considered in SaaS. These are summarised in Table 20.2. ...
... The basic elements of the proposed protocol are: a secure one-way function (e.g., the cryptographic hash SHA-2) used to calculate a HMAC value, a symmetric encryption algorithm (e.g., AES) used to encrypt the data stored in the database, an asymmetric algorithms (e.g., RSA public key cryptosystem) used to facilitate the secure transmission of the secure keys, and timestamps and nonce values used as a challenge-response mechanism to implement mutual authentication between the user application and the integrity attestation system. In fact, AES has been suggested due to its speed, key size and its immunity against code breakage [36] while the RSA public key cryptosystem is currently used as well as a potentially more secure system [10], [37]. Fig. 2 shows the steps to register a user on the server by using a dedicated application installed on the user's device. ...
... Find intrusions in the sensor network and also find the attacks on mob ad-hoc networks. (S. Subhashini et al., 2011) authors collect the information in their survey report that is focused on security issues in services of cloud and improved the performance of cloud or server machine. (Junaid Arshad et al., 2013) author saying virtual machine technology is growing technology in the field of cloud and this is useful for cloud user and providing a flexible infrastructure of the cloud. ...
Reference: supply chains
... It is possible to access the most popular Platform as a Service and Software as a Service, which are two examples of cloud computing services and so on, using the cloud computing infrastructure. The underlying principle of the technology is to provide users with a wide range of services at a low cost [6,7]. Consequently, cloud computing reduces the need to spend a large amount of money on infrastructure or software maintenance and administration. ...
... Subashini et al. (Subashini & Kavitha, 2011) discussed in this paper, they examined the issues in security in in-formation capacity in cloud condition. This makes the information priceless regardless of whether an interloper gains admittance to this information. ...