الفهرس | Only 14 pages are availabe for public view |
Abstract In this research, we presented a proposed data security model for cloud computing based on four phases; access control phase, authentication and attacks defending phase, data encryption phase, and fast data recovery phase. We have implemented two cloud-based applications based on this model and are deployed on both Amazon EC2 and WSO2 cloud computing environments. Access control is achieved through IP filtering. We used Google OAuth and credentials authentication to authenticate the user. Also, we have proposed to use the voice print of the user as an authentication technique, and developed this technique for efficient speaker identification even in noisy environments. |