Provide the Safe Environments for Cloud Computing using Authenticated Key Manage Procedure

  • et al.
N/ACitations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

with the development of cloud computing innovation regarding unwavering quality & proficiency, countless administrations have relocated to the cloud stage. To advantageous access to the administrations & secure the protection of correspondence in people in general system, 3-factor Mutual Authentication & Key Agreement conventions for multi-server designs increase extensive consideration. Be that as it may, the vast majority of the current 3-factor Mutual Authentication & Key Agreement conventions don't give a proper security verification bringing about different assaults going on associated conventions, or they have high calculation & correspondence expenditure. What's more, the majority of the 3-factor Mutual Authentication & Key Agreement conventions haven't a unique denial instrument, which prompts pernicious clients cannot be expeditiously disavowed. To concentrate on these downsides, we plan a unarguable unique revocable 3-factor Mutual Authentication & Key Agreement convention that accomplishes the client dynamic management utilizing Schnorr marks & gives proper security verification in the irregular prophet. Security examination shows that our convention can fulfill different needs in the multi-server situations. Execution investigation exhibits that the proposed plan is appropriate for computing asset obliged savvy gadgets.

Cite

CITATION STYLE

APA

Saikiran, E., Dr. Anubharti, & Rahman, D. Md. A. (2020). Provide the Safe Environments for Cloud Computing using Authenticated Key Manage Procedure. International Journal of Recent Technology and Engineering (IJRTE), 8(5), 413–416. https://doi.org/10.35940/ijrte.e5089.018520

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free