Privacy Secure Data Authentication in Cloud Computing

Authors

  • Sarang RP SOS in Computer Science & Applications Jiwaji University, Gwalior (M.P.), 474001, India
  • Chaturvedi A SOS in Computer Science & Applications Jiwaji University, Gwalior (M.P.), 474001, India
  • Goswami DN OS in Computer Science & Applications Jiwaji University, Gwalior (M.P.), 474001, India

DOI:

https://doi.org/10.26438/ijcse/v6i9.723731

Keywords:

Cloud Computing, 2FA Secure Data Storage Cloud, Server, DSA, Encryption and Decryption Algorithm Cloud Storage

Abstract

Cloud computing is a new modern and broad concept of the world. Users store huge amount of data on cloud storage for future use. Now a day’s privacy to the data stored in cloud is an aspect and security is a very major challenging mission in cloud computing. These challenges have huge effect in the development of secure data storage qualities of cloud system. The objective of this paper is to provide the privacy two factor authentication (2FA) techniques algorithm for the cloud environment with an attempt to bring solutions of such problems. The main aim of this paper is to design and propose TwoFactor Authentication (2FA) technology with One-Time Password (OTP) and finger print for providing strong security system to the data stored in cloud system. This paper, presents two modules, the first module deals with ensuring the storing security of data in encrypted format by using the (2FA) technique and the second module with digital signature algorithm (DSA). We have proposed framework which provides, verifies user authenticity using two-step verification, which is based on password, CSP level key establishment between the users and the cloud server.

References

[1] M.S. Monisha, S. Chidambaram,“Enhanced Data Security using RSA Digital Signature with Robust Reversible Watermarking

Algorithm in Cloud Environment”, International Journal of Electronics & Co mmunication Technology, Vol.8, Issue 1, pp.2024, 2017.

[2] M. Singhal, S. Tapaswi,“Software Tokens Based Two Factor Authentication Scheme”,International Journal of Information and Electronics Engineering, Vol.2, No. 3,pp.383-386, 2012.

[3] N. Mashhadi,“Authentication in mobile cloud computing by combining the tow factor Authentication and one time password token”,Vol.37, Part 2 pp. 220−229, 2015.

[4] Y. Kale, A. B. Patankar, “Enhanced Data Security Mechanism on Cloud using two-factor authentication, data encryption and key Sharing Mechanism”, Proceedings of 11th IRF International Conference, ISBN: 978-93-84209-27-8, pp.158- 161, 2014.

[5] A.Padmapriya, P.Subhasri, “Cloud Computing: Reverse Caesar Cipher Algorithm to Increase Data Security”, International Journal of Engineering Trends and Technology, Vol.4 Issue4, pp.1067- 1071, 2013.

[6] L. Arockiam, S. Monikandan,“Data Security and Privacy in Cloud Storage using Hybrid Symmetric Encryption Algorithm”, International Journal of Advanced Research in Computer and Communication Engineering, Vol.2, Issue 8, pp. 3064-3070, 2013.

[7] T. Sivasakthi, N. Prabakaran, “Applying Digital Signature with Encryption Algorithm of User Authentication for Data Security in

Cloud Computing”, International Journal of Innovative Research in Computer and Communication Engineering,Vol. 2, Issue 2, pp. 3102- 3107,2014.

[8] M. A. Acha, M. J. Po, “Two (2)-Factor Authentication for Cloud Storage”, researchGate,2016.

[9] G. Saini, N. Sharma, “Triple Security of Data in Cloud Computing” ,International Journal of Computer Science and Information Technologies, Vol.5 Issue 4, pp. 5825-5827, 2014.

[10] A. Chaturvedi, D. N. Goswami, R. P. Sarang, “Privacy Algorithms to Improve the Secure Framework for Cloud Computing

Environment”,

International Journal of Advanced Research in Computer and Communication Engineering, Vol.6, Issue 4,pp.63-69, 2017.

[11] D. Patil, P.K.Deshmukh, “Data Security in Cloud Using Attribute Based Encryption with Efficient Keyword Search”, International Journal of Scientific & Engineering Research, Vol.7, Issue 1, pp. 986-991, 2016.

[12] N. Nagar, U. Suman, “A Secure Mobile Cloud Storage Environment using Encryption Algorithm”, International Journal of Computer Applications, Vol.140, No.8, pp.33-43, 2016.

[13] A. Khodwe, V.R.Wadhankar, “Security Enhancement for Privacy Preservation in Cloud Computing by Anonymous Request Access”, International Journal on Recent and Innovation Trends in Computing and Communication, Vol.4, Issue 1, pp. 233-237, 2016.

[14] An Braeken, A. Touhafi, “ Efficient Anonymous User Authentication on Server Without Secure Channel During Registration”, IEEE, 978-1-4673-8894-8, 2016.

[15] R. Sugumar, K. A. M. Joycee, “DSCESEA: Data Security in

Cloud using Enhanced Symmetric Encryption Algorithm”, International Journal of Engineering Research & Technology, Vol.6, Issue 10, pp. 292-295, 2017.

Downloads

Published

2025-11-15
CITATION
DOI: 10.26438/ijcse/v6i9.723731
Published: 2025-11-15

How to Cite

[1]
R. P. Sarang, A. Chaturvedi, and D. Goswami, “Privacy Secure Data Authentication in Cloud Computing”, Int. J. Comp. Sci. Eng., vol. 6, no. 9, pp. 723–731, Nov. 2025.

Issue

Section

Research Article