A Holistic Approach based computing Authentication System

In the current research scenarios cloud computing is a vital role in which services are provided based on proper security on both sides. The CSPs and the end users get attacked by the most of the attackers. So, there is need to make the services more secure. In any case, these reasonable strategies...

Full description

Saved in:
Bibliographic Details
Published in2022 2nd International Conference on Innovative Sustainable Computational Technologies (CISCT) pp. 1 - 4
Main Authors Navalakha, Ankit Kumar, Dinesh Krishnan, S, Pachar, Sunita, Patil, Pratap, Yadav, Ajay Singh, Kumar, Sarvesh
Format Conference Proceeding
LanguageEnglish
Published IEEE 23.12.2022
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:In the current research scenarios cloud computing is a vital role in which services are provided based on proper security on both sides. The CSPs and the end users get attacked by the most of the attackers. So, there is need to make the services more secure. In any case, these reasonable strategies perhaps manage the situation when the district-based realities have been misused. In that capacity, experts are propelling undertakings to tune down a reaction for impervious area information. The cloud services which are provided by the different cloud service providers are providing the authenticated services to the end users. The on-the-spot sales systems are working for the security on the cloud service providers. The analysts in which the quality speed of the purchaser can be utilized in uncovering the area of the client.
DOI:10.1109/CISCT55310.2022.10046505