A Holistic Approach based computing Authentication System
In the current research scenarios cloud computing is a vital role in which services are provided based on proper security on both sides. The CSPs and the end users get attacked by the most of the attackers. So, there is need to make the services more secure. In any case, these reasonable strategies...
Saved in:
Published in | 2022 2nd International Conference on Innovative Sustainable Computational Technologies (CISCT) pp. 1 - 4 |
---|---|
Main Authors | , , , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
23.12.2022
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | In the current research scenarios cloud computing is a vital role in which services are provided based on proper security on both sides. The CSPs and the end users get attacked by the most of the attackers. So, there is need to make the services more secure. In any case, these reasonable strategies perhaps manage the situation when the district-based realities have been misused. In that capacity, experts are propelling undertakings to tune down a reaction for impervious area information. The cloud services which are provided by the different cloud service providers are providing the authenticated services to the end users. The on-the-spot sales systems are working for the security on the cloud service providers. The analysts in which the quality speed of the purchaser can be utilized in uncovering the area of the client. |
---|---|
DOI: | 10.1109/CISCT55310.2022.10046505 |