Cloud computing betters organizations performance by using minimum resources and management assistance, with a shared community, valuable resources. The plain information isn't in command of cloud user once it's published on cloud so it's susceptible to attack from cloud seller itself and an outside attacker. Likewise plain data in transit is actually vulnerable to attack. The proposed strategy emphasizes on improving information security mechanism by implementing two factor authentication for client & provides information encryption which protect information from cloud vendor, an attacker as well as information in transit also crucial sharing mechanism assistance to discuss private information with some other authenticated cloud user.
Article Details
Unique Paper ID: 144265
Publication Volume & Issue: Volume 3, Issue 9
Page(s): 126 - 130
Article Preview & Download
Share This Article
Join our RMS
Conference Alert
NCSEM 2024
National Conference on Sustainable Engineering and Management - 2024