2017
DOI: 10.17148/ijarcce.2017.6505
|View full text |Cite
|
Sign up to set email alerts
|

Improved Data Security Protection Mechanism for Cloud Storage using Two Factors

Abstract: Abstract:This system proposed an improve data security protection mechanism for cloud using two components. In this system sender sends an encrypted message to a receiver with the help of cloud system. The sender requires to know identity of receiver but no need of other information such as certificate or public key. To decrypt the cipher text, receiver needs two parts. The first thing is a unique personal security device or some hardware device connected to the computer system. Second one is private key or se… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…d. True-negative (TN), denotes the negative instances that are properly predicted by the classifier [15]. The evaluation metrics were defined based on the confusion matrix, as shown in (1) to (5). a.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…d. True-negative (TN), denotes the negative instances that are properly predicted by the classifier [15]. The evaluation metrics were defined based on the confusion matrix, as shown in (1) to (5). a.…”
Section: Resultsmentioning
confidence: 99%
“…It provides secure authentication for communicating parties within the network, as the results proved the proposed model safe and practical. Accroding to Kolli et al [5], a system was proposed for improving the data protection mechanism within the cloud network based on two factors, which is implemented depending on the cloud system, as the sender sends an encrypted message to the recipient using the cloud environment then the process of retrieving the encrypted message is done through two factors the first of which is a unique security device that is independent device connected to the computer system, while the second factor is a secret private key stored in the computer system. The results show the confidentiality of the cloud data together with revocability services.…”
Section: Introductionmentioning
confidence: 98%