z-logo
open-access-imgOpen Access
Cloud security: to prevent unauthorized access using an efficient key management authentication algorithm
Author(s) -
Sandeep Kumar,
K. Nirmala
Publication year - 2017
Publication title -
international journal of engineering and technology
Language(s) - English
Resource type - Journals
ISSN - 2227-524X
DOI - 10.14419/ijet.v7i1.1.10787
Subject(s) - cloud computing , computer security , computer science , authentication (law) , key (lock) , cloud computing security , field (mathematics) , code (set theory) , information security , server , world wide web , operating system , set (abstract data type) , mathematics , pure mathematics , programming language
Presently a-days Cloud registering is rising field in light of its Performance, high accessibility, easily. Information store is principle future that cloud benefit gives to the huge association to store tremendous measure of information. Yet at the same time numerous associations are not prepared to execute distributed computing innovation since absence of security. So the principle goal of this paper is to understand the security issues and to anticipate unapproved access in distributed storage, it should be possible with the assistance of an effective validation strategy by utilizing cross breed verification calculation to give security of the information in cloud and guarantee amending code to keep up the nature of administration. In any case, solid client confirmation that confines illicit access to the administration giving servers is the foremost prerequisite for securing cloud condition  

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here