Cloud security: to prevent unauthorized access using an efficient key management authentication algorithm

  • Naveen Kumar S
  • Nirmala K
N/ACitations
Citations of this article
6Readers
Mendeley users who have this article in their library.

Abstract

Presently a-days Cloud registering is rising field in light of its Performance, high accessibility, easily. Information store is principle             future that cloud benefit gives to the huge association to store tremendous measure of information. Yet at the same time numerous              associations are not prepared to execute distributed computing innovation since absence of security. So the principle goal of this paper is to understand the security issues and to anticipate unapproved access in distributed storage, it should be possible with the assistance of an effective validation strategy by utilizing cross breed verification calculation to give security of the information in cloud and guarantee amending code to keep up the nature of administration. In any case, solid client confirmation that confines illicit access to the               administration giving servers is the foremost prerequisite for securing cloud condition

Cite

CITATION STYLE

APA

Naveen Kumar, S., & Nirmala, K. (2017). Cloud security: to prevent unauthorized access using an efficient key management authentication algorithm. International Journal of Engineering & Technology, 7(1.1), 607. https://doi.org/10.14419/ijet.v7i1.1.10787

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free