
Provide the Safe Environments for Cloud Computing using Authenticated Key Manage Procedure
Author(s) -
E. Saikiran*,
Anubharti,
David Rahman
Publication year - 2020
Publication title -
international journal of recent technology and engineering
Language(s) - English
Resource type - Journals
ISSN - 2277-3878
DOI - 10.35940/ijrte.e5089.018520
Subject(s) - computer security , mutual authentication , key (lock) , computer science , cloud computing , authentication (law) , asset (computer security) , plan (archaeology) , operating system , archaeology , history
with the development of cloud computing innovation regarding unwavering quality & proficiency, countless administrations have relocated to the cloud stage. To advantageous access to the administrations & secure the protection of correspondence in people in general system, 3-factor Mutual Authentication & Key Agreement conventions for multi-server designs increase extensive consideration. Be that as it may, the vast majority of the current 3-factor Mutual Authentication & Key Agreement conventions don't give a proper security verification bringing about different assaults going on associated conventions, or they have high calculation & correspondence expenditure. What's more, the majority of the 3-factor Mutual Authentication & Key Agreement conventions haven't a unique denial instrument, which prompts pernicious clients cannot be expeditiously disavowed. To concentrate on these downsides, we plan a unarguable unique revocable 3-factor Mutual Authentication & Key Agreement convention that accomplishes the client dynamic management utilizing Schnorr marks & gives proper security verification in the irregular prophet. Security examination shows that our convention can fulfill different needs in the multi-server situations. Execution investigation exhibits that the proposed plan is appropriate for computing asset obliged savvy gadgets.