An Authentication Technique for Accessing De-Duplicated Data from Private Cloud using One Time Password

نویسندگان

  • Prakash Mohan
  • Saravanakumar Chelliah
چکیده

Objective: The main aim is to de-duplicate the redundant files in the cloud and also to improve the security of files in public cloud service by assigning privileges to the documents when it is uploaded by confidential user. Methods: To achieve the objective the authors have used the AES algorithm to encrypt the file stored after de-duplication in the cloud. De-duplication is done based on comparison of contents, file type and size. For an authorized user to access the file from the cloud, generation of OTP using SSL protocol is adopted. Findings: Files uploaded in the cloud are encrypted using traditional encryption algorithms which don’t provide high levels of security. Files can be accessed by anyone who is authorized. Privileges are not considered. During de-duplication, only the name and size of the files are considered. Application: Files within the public cloud can’t be viewed by everyone who has registered with the cloud. Those who have the respective privileges can only view the file. Proof of Ownership is assured. Since de-duplication is done based on the content redundancy within the cloud storage is avoided. Usage of OTP ensures that the content is viewed by the individuals who have the respective privileges related to the file. These concepts provide additional security to the files stored in the public environment. KeywORDS AES, De-Duplication, Duplicate Copies, OTP, Privileges

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multi-dimensional password generation technique for accessing cloud services

Cloud computing is drastically growing technology which provides an on-demand software, hardware, infrastructure and data storage as services. This technology is used worldwide to improve the business infrastructure and performance. However, to utilize these services by intended customer, it is necessary to have strong password authentication. At present, cloud password authentication can be do...

متن کامل

An Approach towards Security in Private Cloud Using OTP

Although cloud has got a great recognition in today’s world still security is one of the key constraints to be resolved. Since data and applications are moved into cloud data centers, which run on virtual computing in the form of virtual machine, there are a number of security challenges which are yet to be met. With that development, the security to access the cloud also need to be tightened, ...

متن کامل

Strengthen Cloud Computing Security with Enhanced Two Factor Authentication and Encryption

Cloud computing has become a buzzword that nearly everyone has heard but only few can truly understand its correct meaning. Today, cloud has taken over the IT landscape. Cloud computing refers to menu of hosting services usually provided over the internet on a usage or metered basis, while at the same time leveraging infrastructure shared by multiple users. Cloud itself is maintained by cloud s...

متن کامل

Biometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm

Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...

متن کامل

Implementing High Grade Security in Cloud Application using Multifactor Authentication and Cryptography

As a high-speed internet foundation is being developed and people are informationized, most of the tasks are engaged in internet field so there is a risk that any private data like personal information or applications for managing money can be wiretapped or eavesdropped. The consolidation of One Time Passwords (OTPs) and Hash encryption algorithms are used to evolve a more secured password-prot...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IJISP

دوره 11  شماره 

صفحات  -

تاریخ انتشار 2017