Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1)
  • Open Access

    ARTICLE

    Graph-Based Replication and Two Factor Authentication in Cloud Computing

    S. Lavanya1,*, N. M. Saravanakumar2

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2869-2883, 2023, DOI:10.32604/csse.2023.029040 - 21 December 2022

    Abstract Many cutting-edge methods are now possible in real-time commercial settings and are growing in popularity on cloud platforms. By incorporating new, cutting-edge technologies to a larger extent without using more infrastructures, the information technology platform is anticipating a completely new level of development. The following concepts are proposed in this research paper: 1) A reliable authentication method Data replication that is optimised; graph-based data encryption and packing colouring in Redundant Array of Independent Disks (RAID) storage. At the data centre, data is encrypted using crypto keys called Key Streams. These keys are produced using the More >

Displaying 1-10 on page 1 of 1. Per Page