A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Effective Authentication Data Security
2017
International Journal of Advanced Research in Computer and Information Security
Data sharing has ne'er been easier with the advances of cloud computing, associated associate correct analysis on the shared information provides an array of advantages to each the society and people. It permits a information owner to anonymously certify his data which might be place into the cloud for storage or analysis purpose. Nonetheless the expensive certificate verification within the ancient public key infrastructure (PKI) setting becomes a bottleneck for this resolution to be
doi:10.21742/ijacis.2017.1.1.02
fatcat:25qwmebkxjdkjgyud7kuxo4fzm