Authentication mechanisms for preventing cyber crime and providing security in cloud

0Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Cloud computing has made life easier for user and business. The “cloud” is a server where data, applications and software are stored and can be accessed from any device as long as we have internet connection. Nowadays, security is the main issue in the cloud computing environment because cyber crime is increasing abruptly. The main motive of this paper is to reduce the cyber crime in cloud computing. Cyber crime is the phenomenon which interrupts the privacy and security for data storage, to overcome this cyber security is introduced. Cyber security is protection from unauthorized access that aimed to exploitation from attackers which destroys information system. The inference of this paper is to focus on authentication mechanisms for providing security and preventing cyber crime activities in the cloud.

Cite

CITATION STYLE

APA

Chaitra, K. M., Tiwari, S., Bhardwaj, P., & Sharma, T. (2019). Authentication mechanisms for preventing cyber crime and providing security in cloud. International Journal of Innovative Technology and Exploring Engineering, 8(6 Special Issue 4), 1112–1116. https://doi.org/10.35940/ijitee.F1231.0486S419

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free