Main Reference PaperAccess Control for Cloud Computing Through Secure OTP Logging as Services, International Journal of Computer Applications, May 2016.[Java/Cloudsim].
  • Access control model is proposed that works on the basis of OTP for logging service. AES algorithm and interpolation derivatives are used for the OTP generation to utilize minimum key generation time that others.

+ Description
  • Access control model is proposed that works on the basis of OTP for logging service. AES algorithm and interpolation derivatives are used for the OTP generation to utilize minimum key generation time that others.

  • To reduce the security risk over cloud services.

  • To validate proposed algorithm.

+ Aim & Objectives
  • To reduce the security risk over cloud services.

  • To validate proposed algorithm.

  • A technique is contribute that provides more reliable password verification system.

+ Contribution
  • A technique is contribute that provides more reliable password verification system.

  • Java JDK 1.8, MySQL 5.5.40.

  • Netbeans 8.0.1, & J2SE.

+ Software Tools & Technologies
  • Java JDK 1.8, MySQL 5.5.40.

  • Netbeans 8.0.1, & J2SE.

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.