Indian Journal of Science and Technology
DOI: 10.17485/ijst/2016/v9i37/102544
Year: 2016, Volume: 9, Issue: 37, Pages: 1-6
Original Article
Sunghyuck Hong*
Division of Information and Communication, Baekseok University, Cheonan, Chungnam, 33065, Korea; [email protected]
*Author for correspondence
Sunghyuck Hong
Division of Information and Communication
Email: [email protected]
Objectives: The purpose of this study is to improve authentication protocol on Cloud. Methods/Statistical Analysis: The use of authentication and access control technology authorized users only and is limited to random replicates data by providing secure area, to initialize the data stored upon a certain number of password errors for the loss in data protection that recovery is impossible or location. Findings: Cloud computing service is popular and ongoing developing project for the future computer network, which data possessors can remotely saveits data on the cloud storage to use on demand high-resolution based on service and applications from the common pool of configuration and computationalH/W and S/W resources. Therefore, security argument is only argued heuristically in the typical model. Improvements/Applications: The proposal is the first publicly making sure secure cloud storage protocol in the standard model whereas the previous work is not enough security.
Keywords: Access Control, Authentication, Cloud Storage, User Behavior
Subscribe now for latest articles and news.