Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is SC

Handbook of Research on Securing Cloud-Based Databases with Biometric Applications
A SC (stream cipher) is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream (key stream). In a stream cipher each plaintext digit is encrypted one at a time with the corresponding digit of the key stream, to give a digit of the cipher text stream.
Published in Chapter:
Verifiable Response in Heterogeneous Cloud Storage: An Efficient KDC Scheme
Abdul Wahid (Maulana Azad National Urdu University, India), Mohatesham Pasha Quadri (Maulana Azad National Urdu University, India), Ahmad Talha Siddiqui (Maulana Azad National Urdu University, India), Mudasir M. Kirmani (Sher-e-Kashmir University of Agricultural Science and Technology of Kashmir, India), and Khaleel Ahmad (Maulana Azad National Urdu University, India)
DOI: 10.4018/978-1-4666-6559-0.ch005
Abstract
A Distributed Cloud Storage Provider (DCSP) is used for managing the client's data. However, the platform is vulnerable to security attacks, which results in huge losses of client data. The confidential data in an enterprise system may be illegally accessed through a remote interface provided by a heterogeneous-cloud and archives. The data may be lost or tampered with when it is stored in a storage pool outside the enterprise on a cloud. To achieve reliability, consistency, security, and confidentiality of user information Kerberos Protocol is used. The Kerberos protocol is designed to provide reliable authentication over open and insecure networks. The symmetric-key cryptography is maintained for transaction over the network. In this chapter, a cooperative Key-Distribution Center (KDC) scheme is proposed to support dynamic scalability on multiple storage servers. The results of the research work show that KDC provides effective security properties required by Kerberos protocol to mitigate the impact of various attacks in any cloud.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Sustaining SMEs Through Supply Chain Innovation in the COVID-19 Era
Supply chain is a network of suppliers, manufacturers, wholesalers, dealers, distributors and retailers to make the product available to the customer and provide effective and efficient service to the customer.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Fatigue Fracture, CTOD, and CVN Testing in Heat-Affected Zone of High Strength Low Alloy Steels
It is region within the heat affected zone of the metal that is being welded, where the temperature reached is lower than 720ºC.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Issues in Global Food Politics and Options for Sustainable Food Consumption: A Critical Perspective
Sustainable Consumption is consumption that meets the needs of the present and future generation without tainting the environment.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR