Open Access iconOpen Access

ARTICLE

crossmark

Graph-Based Replication and Two Factor Authentication in Cloud Computing

S. Lavanya1,*, N. M. Saravanakumar2

1 Sri Krishna College of Engineering and Technology, Coimbatore, 641008, Tamilnadu, India
2 M. Kumarasamy College of Engineering, Karur, 639113, Tamil Nadu, India

* Corresponding Author: S. Lavanya. Email: email

Computer Systems Science and Engineering 2023, 45(3), 2869-2883. https://doi.org/10.32604/csse.2023.029040

Abstract

Many cutting-edge methods are now possible in real-time commercial settings and are growing in popularity on cloud platforms. By incorporating new, cutting-edge technologies to a larger extent without using more infrastructures, the information technology platform is anticipating a completely new level of development. The following concepts are proposed in this research paper: 1) A reliable authentication method Data replication that is optimised; graph-based data encryption and packing colouring in Redundant Array of Independent Disks (RAID) storage. At the data centre, data is encrypted using crypto keys called Key Streams. These keys are produced using the packing colouring method in the web graph’s jump graph. In order to achieve space efficiency, the replication is carried out on optimised many servers employing packing colours. It would be thought that more connections would provide better authentication. This study provides an innovative architecture with robust security, enhanced authentication, and low cost.

Keywords


Cite This Article

APA Style
Lavanya, S., Saravanakumar, N.M. (2023). Graph-based replication and two factor authentication in cloud computing. Computer Systems Science and Engineering, 45(3), 2869-2883. https://doi.org/10.32604/csse.2023.029040
Vancouver Style
Lavanya S, Saravanakumar NM. Graph-based replication and two factor authentication in cloud computing. Comput Syst Sci Eng. 2023;45(3):2869-2883 https://doi.org/10.32604/csse.2023.029040
IEEE Style
S. Lavanya and N.M. Saravanakumar, “Graph-Based Replication and Two Factor Authentication in Cloud Computing,” Comput. Syst. Sci. Eng., vol. 45, no. 3, pp. 2869-2883, 2023. https://doi.org/10.32604/csse.2023.029040



cc Copyright © 2023 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 941

    View

  • 761

    Download

  • 0

    Like

Share Link