An Authentication Approach To Secure And Validation To Access A Big Data In Clouds
Abstract
The protection of large IT systems is a challenging and an interesting area of problem solving in the realm of internet of things (IoT). There is a wide variety of methods that can be implemented to attack and disrupt the transmission of signals in IT systems, for example, data interception. As a result of such attacks, attackers can gain access to the data being transmitted to and from an IT system. This can be achieved by encryption and decrypting, an encoded language that neither computer nor human can understand. Ccounteracting this attack, this paper suggests an access framework that addresses the issue of data access in an attack and analyzes its security and efficiency. The main advantages of this framework include the ability of the data owner to rightfully validation and authentication the details of an unknown user accessing data and the ability to validation information given by other users for message signal recovery (and hence, avoid attacks on such IT systems). After the framework is explained in the realm of data access through an experiment.
References
[2] O. Brovkina and S. Baranova, “Family vs Discourse,” PSYCHOLINGUISTICS, vol. 25, no. 2, pp. 31–49, Apr. 2019, doi: 10.31470/2309-1797-2019-25-2-31-49.
[3] N. Muradullayeva, “SAMARQAND VILOYATIDA MAISHIY XIZMAT KO‘RSATISH SOHASINI SAMARADORLIGINI BOSHQARISH OMILLARI,” Nashrlar, pp. 337–340, Oct. 2023, doi: 10.60078/2023-vol1-iss1-pp337-340.
[4] D. Tasche, “Bayesian estimation of probabilities of default for low default portfolios,” Journal of Risk Management in Financial Institutions, vol. 6, no. 3, p. 302, Jul. 2013, doi: 10.69554/zfgq4746.
[5] A. K. Alikulovich and Z. Tulkinova, “DEVELOPMENT STRATEGY OF NEW UZBEKISTAN FOR 2022-2026,” The American Journal of Social Science and Education Innovations, vol. 05, no. 05, pp. 5–9, May 2023, doi: 10.37547/tajssei/volume05issue05-02.
[6] D. Lando and T. M. Skødeberg, “Analyzing rating transitions and rating drift with continuous observations,” Journal of Banking & Finance, vol. 26, no. 2–3, pp. 423–444, Mar. 2002, doi: 10.1016/s0378-4266(01)00228-x.