A Novel information retrieval mechanism with secure authentication for third party applications in cloud based integration

Authors

  • Neelima g Department of CSE, Acharya Nagarjuna University, Andhra Pradesh, India
  • Babu ir Department of CSE, Acharya Nagarjuna University, Andhra Pradesh, India

DOI:

https://doi.org/10.26438/ijcse/v6i5.977985

Keywords:

Cloud Integrations, OAuth Mechanism, OData Framework

Abstract

Cloud computing is a potential and assuring IT technique which helps the users to provide shared computing resources on demand. In recent days the companies are depending up on cloud resources for storage and processing of data. As the control of company’s data is handed to the third party the primary factors under utmost concern at the time of information retrieval are security and authentication. Authentication is essential in integration flows between applications for a suite of cloud services enabling users to deploy integrations with security. In my research paper we have used token based OAuth mechanism to provide authentication and query based framework for information retrieval. OAuth is a very secured authentication mechanism that is used to access the data from the source system. Secure retrieval mechanism is used for pulling the data from the cloud. The authentication technique used in our research paper is enhanced by using handshaking process with the source system and token generation in encrypted format. Analysis and implementation of this mechanism in the demo system illustrates its level of security.

References

[1] Johannes K. Chiang, Eric H.W. Yen, Yen-Hua Chun, Authentication, Authorization and File Synchronization on Hybrid Cloud on Case of Google Docs, Hadoop, And Linux Local Hosts, IEEE DOI 10.1109/ISBAST,2013

[2] Ja-Hwa Liu, Shi-Kai Huang: “A Research into Protection Mechanism for Cloud Information Security”, Proc. of the 2010 Conference on Computer Vision, Image Processing and Information, Zhongli Taiwan, Jun. 9, 2010

[3] Liang-Jie Zhang, Quan Zhou, “CCOA: Cloud Computing Open Architecture,” IEEE DOI 10.1109/ICWS, 2009.

[4] Harry Katzian Jr, “On the Privacy of Cloud Computing”, International Journal of Management and Information Systems. Littleton: Second Quarter 2010. Vol. 14, Iss. 2; p. 1

[5] Bhaskar Prasad Rimal, Eunmi Choi, Ian Lumb, "A Taxonomy and Survey of Cloud Computing Systems”, ncm, pp.44-51, 2009 Fifth International Joint Conference on INC, IMS and IDC, 2009

[6] W Michael Ryan, Christopher M Loeffler, “Insights into Cloud Computing” Intellectual Property & Technology Law Journal. Clifton: Nov 2010. Vol. 22, Iss. 11; p. 22

[7] Qingqing Xie, Liangmin Wang and Hong Zhong “Non-Repudiable Query Answer Authentication Scheme over Anonymous Cloud Data”, 2016 International Conference on Advanced Cloud and Big Data, IEEE DOI 10.1109

Downloads

Published

2025-11-13
CITATION
DOI: 10.26438/ijcse/v6i5.977985
Published: 2025-11-13

How to Cite

[1]
G. Neelima and I. R. Babu, “A Novel information retrieval mechanism with secure authentication for third party applications in cloud based integration”, Int. J. Comp. Sci. Eng., vol. 6, no. 5, pp. 977–985, Nov. 2025.

Issue

Section

Research Article