Loading

Authentication Mechanisms for Preventing Cyber Crime and Providing Security in Cloud
Chaitra K.M1, Soniya Tiwari2, Pooja Bhardwaj3, Tanvi Sharma4

1Chaitra K.M., Assistant Professor, Department of Computer Science Engineering, JSS Academy of Technical Education, Noida. India. 

2Soniya Tiwari, M. Tech, Department of Computer Science Engineering, JSS Academy of Technical Education, Noida. India.

3Pooja Bhardwaj, M. Tech, Department of Computer Science Engineering, JSS Academy of Technical Education, Noida. India.

4Tanvi Sharma, M. Tech, Department of Computer Science Engineering, JSS Academy of Technical Education, Noida. India.

Manuscript received on 13 April 2019 | Revised Manuscript received on 20 April 2019 | Manuscript Published on 26 July 2019 | PP: 1112-1116 | Volume-8 Issue-6S4 April 2019 | Retrieval Number: F12310486S419/19©BEIESP | DOI: 10.35940/ijitee.F1231.0486S419

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cloud computing has made life easier for user and business. The “cloud” is a server where data, applications and software are stored and can be accessed from any device as long as we have internet connection. Nowadays, security is the main issue in the cloud computing environment because cyber crime is increasing abruptly. The main motive of this paper is to reduce the cyber crime in cloud computing. Cyber crime is the phenomenon which interrupts the privacy and security for data storage, to overcome this cyber security is introduced. Cyber security is protection from unauthorized access that aimed to exploitation from attackers which destroys information system. The inference of this paper is to focus on authentication mechanisms for providing security and preventing cyber crime activities in the cloud.

Keywords: Authentication, Security, Encryption , Cyber Crime, Deep Fake, Forensics.
Scope of the Article: Computer Science and Its Applications