Secured two factor authentication, graph based replication and encryption strategy in cloud computing.
S. LavanyaN. M. SaravanakumarPublished in: Multim. Tools Appl. (2023)
Keyphrases
- cloud computing
- factor authentication
- computing resources
- data center
- cloud storage
- distributed computing
- data management
- trusted computing
- service providers
- cloud computing environment
- databases
- computing platform
- cloud computing platform
- security issues
- database
- fault tolerance
- cloud services
- fault tolerant
- data warehouse
- data model