Open Access
ARTICLE
Graph-Based Replication and Two Factor Authentication in Cloud Computing
1 Sri Krishna College of Engineering and Technology, Coimbatore, 641008, Tamilnadu, India
2 M. Kumarasamy College of Engineering, Karur, 639113, Tamil Nadu, India
* Corresponding Author: S. Lavanya. Email:
Computer Systems Science and Engineering 2023, 45(3), 2869-2883. https://doi.org/10.32604/csse.2023.029040
Received 23 February 2022; Accepted 22 July 2022; Issue published 21 December 2022
Abstract
Many cutting-edge methods are now possible in real-time commercial settings and are growing in popularity on cloud platforms. By incorporating new, cutting-edge technologies to a larger extent without using more infrastructures, the information technology platform is anticipating a completely new level of development. The following concepts are proposed in this research paper: 1) A reliable authentication method Data replication that is optimised; graph-based data encryption and packing colouring in Redundant Array of Independent Disks (RAID) storage. At the data centre, data is encrypted using crypto keys called Key Streams. These keys are produced using the packing colouring method in the web graph’s jump graph. In order to achieve space efficiency, the replication is carried out on optimised many servers employing packing colours. It would be thought that more connections would provide better authentication. This study provides an innovative architecture with robust security, enhanced authentication, and low cost.Keywords
Cite This Article
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.