Abstract

Objectives: The purpose of this study is to improve authentication protocol on Cloud. Methods/Statistical Analysis: The use of authentication and access control technology authorized users only and is limited to random replicates data by providing secure area, to initialize the data stored upon a certain number of password errors for the loss in data protection that recovery is impossible or location. Findings: Cloud computing service is popular and ongoing developing project for the future computer network, which data possessors can remotely saveits data on the cloud storage to use on demand high-resolution based on service and applications from the common pool of configuration and computational H/W and S/W resources. Therefore, security argument is only argued heuristically in the typical model. Improvements/Applications: The proposal is the first publicly making sure secure cloud storage protocol in the standard model whereas the previous work is not enough security.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call