Volume- 10
Issue- 2
Year- 2023
DOI: 10.55524/ijirem.2023.10.2.21 |
DOI URL: https://doi.org/10.55524/ijirem.2023.10.2.21
Crossref
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0)
Article Tools: Print the Abstract | Indexing metadata | How to cite item | Email this article | Post a Comment
GiriBabu Sadineni , Janardhan Reddy D , Adusumalli Niharika, Kommu Tejaswini, Golla Vandana, Padmini Biyyapu
Cloud computing (CC) has matured in terms of dependability and effectiveness, which has led to the migration of many applications to the cloud. Three-factor Multilateral Authenticity and Knowledge Acceptance (MAKA) mechanisms for multi-server systems are gaining a lot of interest for their convenience and security. Although there are many extant three-factor MAKA protocols, none of them give a rigorous secure guarantee, making them vulnerable to numerous assaults on other procedures in the chain. And most three-factor MAKA mechanisms lack adaptive cancellation mechanisms, preventing malevolent users from being quickly removed. We present a three-factor MAKA protocol with a proven adaptive reversible evidence in the arbitrary source to overcome these issues. This method uses Schnorr identities to enable vibrant administration by the client. In multi-server setups, our procedure is capable of meeting a wide range of requirements. For intelligent systems with low processing power, the suggested method is a viable option. The entire computation code demonstrates the system's viability.
Associate Professor, Department of Computer Science & Engineering, PACE Institute of Technology & Sciences, Ongole, Andhra Pradesh, India
No. of Downloads: 15 | No. of Views: 191
Tushar Maurya, Saurav Kumar Singh, Vikram Thakur, Sachin Chawla.
June 2024 - Vol 11, Issue 3
Lakshya Mall, Priyanka Vashisht, Ashima Narang.
June 2024 - Vol 11, Issue 3
Abhishek Patil, Diya Raut, Roshani Prasad, Charudatta Shimpi.
April 2024 - Vol 11, Issue 2