Strengthen Cloud Computing Security with Enhanced Two Factor Authentication and Encryption
نویسندگان
چکیده
Cloud computing has become a buzzword that nearly everyone has heard but only few can truly understand its correct meaning. Today, cloud has taken over the IT landscape. Cloud computing refers to menu of hosting services usually provided over the internet on a usage or metered basis, while at the same time leveraging infrastructure shared by multiple users. Cloud itself is maintained by cloud service providers through networked “server farms”. They offer their subscribers unlimited availability and data storage, along with the seamless access to software, application provisioning and automatic upgrades. Security is one of the most concerning downsides while using cloud services. As organisations and individuals store data in cloud and if this data isn‟t properly protected loss and exposure can happen. Therefore confidentiality, authentication and access control are the challenging factors in data security. Our work attempts to overcome these types of data security concerns. In this paper to ensure authentication, a strong authentication mechanism using muti-step authentication has implemented based on dynamic one time password technique. This technique is very much secure, robust and highly efficient. The produced mobile token which is valid for only a small session is used by client to authenticate itself. For data storage security and information security over cloud AES-256 encryption and MD5 hashing is used. Access controls and permissions on data accessibility are also gets implemented. Our work mainly deals with cloud computing security model.
منابع مشابه
DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملSESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing
While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...
متن کاملRESCUE: Reputation based Service for Cloud User Environment
Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...
متن کاملTrusted Authentication and Security of Medical Data in Cloud Computing
Cloud computing provides shared, on-demand and scalable services over internet with user’s data being processed in remote machines and required services provided. The main barrier in using this new technology in different field is the users fear on data security, availability and integrity of their own data in remote servers. In this paper, an efficient cloud storage system for storing medical ...
متن کاملEnhanced Security Architecture for Cloud Data Security
Cloud computing offers a prominent service for data storage known as cloud storage. The flow and storage of data on the cloud environment in plain text format may be main security threat. So, it is the responsibility of cloud service providers to ensure privacy and security of data on storage as well as network level. The following three parameters confidentiality, integrity and availability de...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015