<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2d1 20170631//EN" "JATS-journalpublishing1.dtd">
<article xlink="http://www.w3.org/1999/xlink" dtd-version="1.0" article-type="technology" lang="en"><front><journal-meta><journal-id journal-id-type="publisher">IJCRR</journal-id><journal-id journal-id-type="nlm-ta">I Journ Cur Res Re</journal-id><journal-title-group><journal-title>International Journal of Current Research and Review</journal-title><abbrev-journal-title abbrev-type="pubmed">I Journ Cur Res Re</abbrev-journal-title></journal-title-group><issn pub-type="ppub">2231-2196</issn><issn pub-type="opub">0975-5241</issn><publisher><publisher-name>Radiance Research Academy</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">1603</article-id><article-id pub-id-type="doi"/><article-id pub-id-type="doi-url"/><article-categories><subj-group subj-group-type="heading"><subject>Technology</subject></subj-group></article-categories><title-group><article-title>AN AUTHENTICATION IN CLOUD THROUGH DATA COLORING USING PROGRESSIVE APPROACH&#13;
</article-title></title-group><contrib-group><contrib contrib-type="author"><name><surname>Sandosh</surname><given-names>S.</given-names></name></contrib><contrib contrib-type="author"><name><surname>Uthayashangar</surname><given-names>S.</given-names></name></contrib></contrib-group><pub-date pub-type="ppub"><day>15</day><month>11</month><year>2012</year></pub-date><volume>)</volume><issue/><fpage>179</fpage><lpage>182</lpage><permissions><copyright-statement>This article is copyright of Popeye Publishing, 2009</copyright-statement><copyright-year>2009</copyright-year><license license-type="open-access" href="http://creativecommons.org/licenses/by/4.0/"><license-p>This is an open-access article distributed under the terms of the Creative Commons Attribution (CC BY 4.0) Licence. You may share and adapt the material, but must give appropriate credit to the source, provide a link to the licence, and indicate if changes were made.</license-p></license></permissions><abstract><p>Trust and security have prevented businesses from fully accepting cloud platforms. To protect clouds, CSP (Cloud Service Providers) must first secure virtualized data-center resources, maintain user privacy, and preserve data integrity. Using a trust-overlay network over multiple data centers to implement a reputation system for establishing trust between service providers and data owners is becoming mandatory. Data coloring and software watermarking techniques protect shared data objects and ensures the security level in the cloud. These techniques safeguard multi-way authentications, enable single sign-on in the cloud, and strengthen the security for accessing confidential data in both public and private clouds. However the problem is, once the onetime authentication is done with Cloud Service Provider (CSPs), there is no guarantee that only the legitimate user is accessing the confidential data and maintaining privacy till the user quits the secured cloud. Hence to provide the continuous authentication the proposal has been designed.&#13;
</p></abstract><kwd-group><kwd>Cloud computing</kwd><kwd> Data coloring</kwd><kwd> Progressive Approach</kwd><kwd> Secure Hash Algorithm-1.</kwd></kwd-group></article-meta></front></article>
