Improve Security with RSA and Cloud Oracle 10g

Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 248)


This paper is the extended part of “A PROSPECTIVE APPROACH ON SECURITY WITH RSA ALGORITHM AND CLOUD SQL IN CLOUD COMPUTING” in this paper research work in done on RSA Security with cloud Oracle 10g it helps organizations protect private information and manage the identities of people and applications accessing and exchanging that information. cloud Oracle 10g Identity Management solution consists of the Oracle Internet Directory as well as additional security components and services provided by Oracle Application Server 10g, including provisioning, authentication and single sign-on (SSO) to Oracle and RSA are designed to provide the most seamless e-security experience in the market, To satisfy the customer needs from anywhere the information posted by the customer is not maintained in a single site or computer, rather maintained in number of trusted nodes. Simultaneous and faster access by different users from different places is also supported. To get high reliability and availability the data processed by the customer is stored and updated in multiple machines. If any one node gets failed, the other one provides the service. It reduce the costs associated with computing, dynamic resource pools, virtualization, increases the efficiency of computing and high availability.


Single Sign On(SSO) RSA Oracle Application Server 10g Internet directory Virtualization 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Ramgovind, S., Eloff, M.M., Smith, E.: The Management of Security in Cloud computing. In: Proc. Information Security for South Asia (ISSA 2010), pp. 1–7. IEEE Press (2010)Google Scholar
  2. 2.
    Wang, C., et al.: Toward Publicly Auditable Secure Cloud Data Storage Services. IEEE Network 24(4), 19–24 (2010)CrossRefGoogle Scholar
  3. 3.
    Takabi, H., Joshi, J.B.D., Ahn, G.-J.: SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments. In: Proc. 2010 IEEE 34th Ann. Computer Software and Applications Conf. Workshops, pp. 393–398. IEEE Press (2010)Google Scholar
  4. 4.
    Zhou, M., et al.: Security and Privacy in Cloud Computing: A Survey. In: Proc. 6th Int’l Conf. Semantics, Knowledge and Grids, pp. 105–112. IEEE Press (2010)Google Scholar
  5. 5.
    Popovic, K., Hocenski, Z.: Cloud Computing Security Issues and Challenges. In: Proc. 33rd Int’l Convention on Information and Comm. Technology, Electronics and Microelectronics (MIPRO 2010), pp. 344–349. IEEE Press (2010)Google Scholar
  6. 6.
    Morsy, M.A., Grundy, J., Müller, I.: An Analysis of the Cloud Computing Security Problem. In: Proc. 17th Asia Pacific Software Eng. Conf. 2010 Cloud Workshop (APSEC 2010). IEEE Press (2010)Google Scholar
  7. 7.
    Grobauer, B., Walloschek, T., Stöcker, E.: Understanding Cloud-ComputingVulnerabilities. IEEE Security and Privacy 9(2), 50–57 (2011)CrossRefGoogle Scholar
  8. 8.
    Lua, P., Yow, K.C.: Mitigating DDoS Attacks with Transparent and Intelligent Fast-Flux Swarm Network. IEEE Network 25(4), 28–33 (2011)CrossRefGoogle Scholar
  9. 9.
    Pham, V.H., Dacier, M.: Honeypot Trace Forensics: The Observation Viewpoint Matters. Future Generation Computer System—Int’l J. Grid Computing and E- science 27(5), 539–546 (2011)CrossRefGoogle Scholar
  10. 10.
    Phillips, C., Swiler, L.P.: A graph-based system for network-vulnerability analysis. In: Proceedings of the 1998 Workshop on New Security Paradigms (NSPW 1998), pp. 71–79. ACM, New York (1998)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  1. 1.Department of Computer ScienceGITAM UniversityVisakhapatnamIndia

Personalised recommendations