A Novel information retrieval mechanism with secure authentication for third party applications in cloud based integration
DOI:
https://doi.org/10.26438/ijcse/v6i5.977985Keywords:
Cloud Integrations, OAuth Mechanism, OData FrameworkAbstract
Cloud computing is a potential and assuring IT technique which helps the users to provide shared computing resources on demand. In recent days the companies are depending up on cloud resources for storage and processing of data. As the control of company’s data is handed to the third party the primary factors under utmost concern at the time of information retrieval are security and authentication. Authentication is essential in integration flows between applications for a suite of cloud services enabling users to deploy integrations with security. In my research paper we have used token based OAuth mechanism to provide authentication and query based framework for information retrieval. OAuth is a very secured authentication mechanism that is used to access the data from the source system. Secure retrieval mechanism is used for pulling the data from the cloud. The authentication technique used in our research paper is enhanced by using handshaking process with the source system and token generation in encrypted format. Analysis and implementation of this mechanism in the demo system illustrates its level of security.
References
[1] Johannes K. Chiang, Eric H.W. Yen, Yen-Hua Chun, Authentication, Authorization and File Synchronization on Hybrid Cloud on Case of Google Docs, Hadoop, And Linux Local Hosts, IEEE DOI 10.1109/ISBAST,2013
[2] Ja-Hwa Liu, Shi-Kai Huang: “A Research into Protection Mechanism for Cloud Information Security”, Proc. of the 2010 Conference on Computer Vision, Image Processing and Information, Zhongli Taiwan, Jun. 9, 2010
[3] Liang-Jie Zhang, Quan Zhou, “CCOA: Cloud Computing Open Architecture,” IEEE DOI 10.1109/ICWS, 2009.
[4] Harry Katzian Jr, “On the Privacy of Cloud Computing”, International Journal of Management and Information Systems. Littleton: Second Quarter 2010. Vol. 14, Iss. 2; p. 1
[5] Bhaskar Prasad Rimal, Eunmi Choi, Ian Lumb, "A Taxonomy and Survey of Cloud Computing Systems”, ncm, pp.44-51, 2009 Fifth International Joint Conference on INC, IMS and IDC, 2009
[6] W Michael Ryan, Christopher M Loeffler, “Insights into Cloud Computing” Intellectual Property & Technology Law Journal. Clifton: Nov 2010. Vol. 22, Iss. 11; p. 22
[7] Qingqing Xie, Liangmin Wang and Hong Zhong “Non-Repudiable Query Answer Authentication Scheme over Anonymous Cloud Data”, 2016 International Conference on Advanced Cloud and Big Data, IEEE DOI 10.1109
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
