The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Objectives: To analysis various mechanisms to improve the security of cloud storage system.

Methods: The methods such as unidirectional proxy re-encryption schemes, Identity-Based Proxy Re-Encryption system, third party auditor scheme, NCCloud, certificate based signature scheme and two-factor data security protection mechanism are analyzed in this paper.

Findings: In this paper various cloud storage data security protection techniques are compared through their merits and demerits of the technique to prove two-factor data security protection is better than other techniques. Encryption is the most effective technique to transmit the sensitive data in cloud environment. The findings of this work prove that the two-factor data security protection mechanism provides better result than other approaches.


Keywords

Cloud Storage System, Cloud Security, Cloud Protection, Two-Factor Data Security Protection.
User
Notifications