Security and Sharing of Data through Various Access Levels in Transparent Computing
Abstract: Transparent computing, the hosts and the users are working on a low-cost high-performance environment but they are placed at distinct places at distinct locations due to which their accessibility decreases. In this paper, we have introduced various levels of accessing the data and sharing them. In these levels, each level will provide a security check to the user and gives restricted access. This proposed system which we were shown is effective in providing security at various levels, providing accessibility to data from anywhere and protecting it from different hazardous attacks.
Keywords: Transparent computing, Authentication, data access, security.
How to Cite:
[1] D. Shireesha, Ayush Goyal, Arun Kumar Jangid, Jitesh Jain, “Security and Sharing of Data through Various Access Levels in Transparent Computing,” International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), DOI: 10.17148/IJARCCE.2017.63189
