An investigation on replication and encryption strategies for ensuring strong security in cloud
Loading...
Date
item.page.authors
Journal Title
Journal ISSN
Volume Title
Publisher
Abstract
The proliferation of distributed systems and the increasing volume
newlineof sensitive data they handle demand robust security measures. This research
newlineintroduces a comprehensive approach that combines an enhanced
newlineauthentication method, efficient replication strategies, and a state-of-the-art
newlineencryption algorithm to safeguard data in cloud computing. The enhanced
newlineauthentication method leverages multi-factor authentication, biometrics, and
newlinebehavioural analysis to fortify access control, ensuring that only authorized
newlineusers can interact with the system. This not only enhances security but also
newlineimproves user experience and mitigates the risk of unauthorized access.
newlineThe proposed methods of authentication includes enhanced
newlinegraphical password authentication and secured two factor authentication
newlineoffers strong solution for user s to maintain their accounts online in a safe
newlineway. The graphical password verifies the scenario of different authentication
newlinemethods and brings out a novel idea of choosing images and its points by the
newlineuser on their own to build a secure environment. The password generated by
newlinethis techniques improves security, reduced storage space and login time spend
newlineby the user compared to state of art literature study.
newlineThe two factor authentication is said to be easiest and strongest
newlineway to secure user environment in the current era. This is used by all the
newlineapplication hosters in cloud includes banking sectors, government agencies,
newlinehealthcare applications and any mission critical intensive applications. This
newlinemethod encounters an issue and still the hosters insist the user s not to reveal
newlineone time password to any outsiders. In order to avoid this, a secured two
newlinefactor authentication mechanism is introduced in this research to enhance
newlinesecurity.
newline
newline