Remote Access and Dual Authentication for Cloud Storage

Journal Title: International Journal of Modern Engineering Research (IJMER) - Year 2014, Vol 4, Issue 5

Abstract

Cloud computing is an emerging technology, which provides services over internet such as software, hardware, network and storage. The key role for cloud computing is virtualization which reduces the total cost and gives reliable, flexible and secured services. However compute service are chosen between the providers located in multiple data centres. One of the major security concerns related to the virtualization and the Storage where the outside attackers can use the files in the storage and the data owners are not capable of knowing attacks. In this paper we proposed a high level authentication for the cloud user and remote monitor controlled of your cloud storage. Here our model provides the dual authentication for the cloud and to get the runtime record of the logs and the secured application controls, the logs are remotely accessed and controlled by the owner of the data.

Authors and Affiliations

Keywords

Related Articles

 Zigbee Based Wireless Sensor Networks for Smart Campus

 A network which connects a bunch of distributed low-power sensor nodes together, with each node dedicated to a predefined operation can be visualized as a Wireless Sensor Network (WSN). The network must have th...

AC-DC-AC-DC Converter Using Silicon Carbide Schottky Diode

 Silicon carbide (SiC) is the perfect cross between silicon and diamond. The crystal lattice of SiC is identical to silicon and diamond, but, exactly half the lattice sites are occupied by silicon atoms and half by...

 The Mechanical Behaviour of Recycled High Density Polyethylene

 Abstract: In last few years with the increasing use of polymeric materials the disposal of the used material became a serious problem. As polyethylene is one of the common used polymers in many applications it repr...

 Optical Character Recognisation

Optical Character Recognition by using Template Matching is a system which is useful to recognize the character or alphabets in the given text by comparing two images of the alphabet. The objectives of this sys...

A Review on Six Sigma (DMAIC) Methodology

The growth rate of fair-size institutions and Organization is directly related to the implementation of Six Sigma Methodology. This paper consists of detailed analysis regarding application of six sigma Methodo...

Download PDF file
  • EP ID EP136909
  • DOI -
  • Views 102
  • Downloads 0

How To Cite

(2014). Remote Access and Dual Authentication for Cloud Storage. International Journal of Modern Engineering Research (IJMER), 4(5), 53-55. https://europub.co.uk/articles/-A-136909