The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Objectives: The purpose of this study is to improve authentication protocol on Cloud. Methods/Statistical Analysis: The use of authentication and access control technology authorized users only and is limited to random replicates data by providing secure area, to initialize the data stored upon a certain number of password errors for the loss in data protection that recovery is impossible or location. Findings: Cloud computing service is popular and ongoing developing project for the future computer network, which data possessors can remotely saveits data on the cloud storage to use on demand high-resolution based on service and applications from the common pool of configuration and computational H/W and S/W resources. Therefore, security argument is only argued heuristically in the typical model. Improvements/Applications: The proposal is the first publicly making sure secure cloud storage protocol in the standard model whereas the previous work is not enough security.

Keywords

Access Control, Authentication, Cloud Storage, User Behavior.
User