Multi - level Authentication Technique for Accessing Organization in Cloud Data

نویسنده

  • M. S. Deshmukh
چکیده

The purpose of this paper is to present the design for providing security and higher authentication scheme for executing secure data transaction in an Organization field over Internet. There has been incessant change in technology day by day, so security mechanisms like authentication schemes are also required to be updated. Authentication schemes that involve more than single level for authentication are moderately safer than one level authentication scheme. Numbers of multi-level authentication schemes have been proposed and implemented in various cloud computing services. In case of Cloud computing, the whole authentication control lies toward the server side. So, it is very tough to trust the third party server in Cloud Computing. This work proposes a scheme in which authentication process is carried out in two levels or multi-levels. In this system, authentication activities take place in organization, team and user levels. First activity happens at organization level. It reads the authentication password and checks to cloud access for organization and then it enters into a second level authentication. The second activity happens at team level. It reads the team login details and checks for authentication. It is a team authentication activity, once authentication done; it then enters into a user level authentication. User level activity reads the authentication information to check for the user permission and privileges. Index Terms : Authentication, security, multi-level Authentication, Cloud Computing, Authentication services, key techniques

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multi-dimensional password generation technique for accessing cloud services

Cloud computing is drastically growing technology which provides an on-demand software, hardware, infrastructure and data storage as services. This technology is used worldwide to improve the business infrastructure and performance. However, to utilize these services by intended customer, it is necessary to have strong password authentication. At present, cloud password authentication can be do...

متن کامل

A User Identification Technique to Access Big Data Using Cloud Services

Authentication is required in stored database systems so that only authorized users can access the data and related cloud infrastructures. This paper proposes an `authentication technique using multi-factor and multi-dimensional authentication system with multi-level security. The proposed technique is likely to be more robust as the probability of breaking the password is extremely low. This f...

متن کامل

RESCUE: Reputation based Service for Cloud User Environment

Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...

متن کامل

Biometric Authentication and Data Security in Cloud Computing

The paper presents a new Cloud platform designed to support basic web applications shared by small and medium companies. The platform guarantees secure access of multiple users and complete logical separation of computational and data resources related to different companies. A peculiar data fragmentation approach ensures a high-level of protection of the data stored in the Cloud. The platform ...

متن کامل

Design and Implementation of Secure Multi-Authentication Data Storage in Cloud using Machine Learning Data Classification

Cloud computing offers numerous benefits including scalability, availability and many services. But with its wide acceptance all over the globe, new risks and vulnerabilities have appeared too. Cloud computing supplies facility of storing and accessing understanding and programs over the web without bothering the storage space on procedure. Storing the data on cloud eliminates one’s worries abo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014