A Two Factor Key Authentication for End to End Decryption

Authors

  • T. Vijay Kumar
  • Sybicynthia. G

Abstract

The accessing of the other data from their system is occurring as common. By using their system as the main server and fetching the parol of another system. To reduce these kinds of activities the two way system has been implemented in this paper. The person who can access the other devices or fetching the data they need to first enter the pin. The pin can be change randomly so the opponent can struggle to fetches the data and the other factor is the data are in the encrypted pattern. So when they get to fetches the data the original content of the data cannot be available in the server. The two factors provide a high data security to the system and the cloud communication. 

Downloads

Published

2020-02-01

Issue

Section

Articles