{"title":"Modeling of Secure Authentication Schemes in Cloud Computing based on Hybrid Data Classification","authors":"S. Harshitha, K. Suresh, L. Manjesh","doi":"10.1109/GlobConPT57482.2022.9938267","DOIUrl":null,"url":null,"abstract":"There are numerous ways to categories cloud computing services, including scalability, availability, and a broad range of services. Without paying any additional fees, cloud computing enables you to save and access data and perform activities through the internet. Storage area of the system. Using the cloud to store data removes the stress related to storage space, new storage equipment purchases, and data management. It has unlimited access to personal data, and anywhere with access to the internet. However, the growing security issues have resisted the enterprises' use of cloud connectivity entire computation Therefore, security issues have emerged as cloud computing's main disadvantage. In this proposed system, modified honeypot techniques has been used for secure data storage in cloud computing. In order to safeguard user data stored in cloud storage, this method parameter will be a successful security system, such as encryption, authentication, and authorization.","PeriodicalId":431406,"journal":{"name":"2022 IEEE Global Conference on Computing, Power and Communication Technologies (GlobConPT)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE Global Conference on Computing, Power and Communication Technologies (GlobConPT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GlobConPT57482.2022.9938267","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
There are numerous ways to categories cloud computing services, including scalability, availability, and a broad range of services. Without paying any additional fees, cloud computing enables you to save and access data and perform activities through the internet. Storage area of the system. Using the cloud to store data removes the stress related to storage space, new storage equipment purchases, and data management. It has unlimited access to personal data, and anywhere with access to the internet. However, the growing security issues have resisted the enterprises' use of cloud connectivity entire computation Therefore, security issues have emerged as cloud computing's main disadvantage. In this proposed system, modified honeypot techniques has been used for secure data storage in cloud computing. In order to safeguard user data stored in cloud storage, this method parameter will be a successful security system, such as encryption, authentication, and authorization.