Abstract: Transparent computing, the hosts and the users are working on a low-cost high-performance environment but they are placed at distinct places at distinct locations due to which their accessibility decreases. In this paper, we have introduced various levels of accessing the data and sharing them. In these levels, each level will provide a security check to the user and gives restricted access. This proposed system which we were shown is effective in providing security at various levels, providing accessibility to data from anywhere and protecting it from different hazardous attacks.
Keywords: Transparent computing, Authentication, data access, security.