Cargando…

Authentication Protocol for Cloud Databases Using Blockchain Mechanism

Cloud computing has made the software development process fast and flexible but on the other hand it has contributed to increasing security attacks. Employees who manage the data in cloud companies may face insider attack, affecting their reputation. They have the advantage of accessing the user dat...

Descripción completa

Detalles Bibliográficos
Autores principales: Deep, Gaurav, Mohana, Rajni, Nayyar, Anand, Sanjeevikumar, P., Hossain, Eklas
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6832710/
https://www.ncbi.nlm.nih.gov/pubmed/31615014
http://dx.doi.org/10.3390/s19204444