The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2021
DOI: 10.1007/s40747-021-00305-0
|View full text |Cite
|
Sign up to set email alerts
|

Three factor authentication system with modified ECC based secured data transfer: untrusted cloud environment

Abstract: Cloud computing (CC) is a technology that delivers its service by means of the internet. In the modern scenario, cloud storage services have gained attention. The cloud environment confronts data breaches expansively in cloud storage, which might bring about the disclosure of personal in addition to corporate data. Thus, the requirement arises for the creation of a more foremost authentication system. Customary authentication schemes depend on techniques, like Password Authentications Protocol (PAP), Challenge… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(10 citation statements)
references
References 26 publications
0
10
0
Order By: Relevance
“…ECC-based secure cloud framework with logging mechanism is to provide a highlevel design of the SSL VPN and secure cloud mobile banking. It helps secure data transfer for the users [8][9][10]. Software applications and web services are used with secure log files maintained.…”
Section: Design Of Secured Cloud Storage Mechanismmentioning
confidence: 99%
“…ECC-based secure cloud framework with logging mechanism is to provide a highlevel design of the SSL VPN and secure cloud mobile banking. It helps secure data transfer for the users [8][9][10]. Software applications and web services are used with secure log files maintained.…”
Section: Design Of Secured Cloud Storage Mechanismmentioning
confidence: 99%
“…Nevertheless, the approach provided confidentiality for data only not for data owners along with users. (Vengala et al, 2021)designed a 3-factor authentication grounded on secured data transfer in an un-trusted cloud. The model was developed with Modified ECC (MECC) to securely transfer the data.…”
Section: Literature Surveymentioning
confidence: 99%
“…The security of confidential data can be realised through utilising one of the cryptographic mechanisms including encryption and data hiding. In [42], Vengala et al presented a new framework for authentication, data compression, and safe data transfer in the cloud environment. However, the framework can be cracked if the eavesdropper locates the data location.…”
Section: Related Workmentioning
confidence: 99%