Header menu link for other important links
Survey on Two Factor Data Security Protection Mechanism for Cloud Services
Md Zafruddin,
Published in ICI World of Journals
Volume: 6.0
Issue: 3.0
Pages: 1856.0 - 1858.0
In our system, proposed system exhibit another fine-grained two-variable approval (2FA) get theopportunity to control structure for electronic circulated Computing associations .We introduced user cannot accessdata without a secret key and a light weight security device like a finger print scanner ,and user need both secret keyas well as a light weight security device for accessing of any file.If secret key and user thumb match with registeredimage then user can view file as well download it. admin store file in fragmented format also with its replica. If someof uploaded files fragment data loss then we can get backup of our data from replica .We also introduced, If we want toacess any file in a a particular location and for a particular time then we can do it.from user, security key is stolen ordelete from a mail then user can revoke this security key from admin by request. Admin will accept the request andsend key on users mail so user can download the file.
About the journal
JournalInternational Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE), ISSN (Online): 2320-9801
PublisherICI World of Journals
Open Access0