Privacy Secure Data Authentication in Cloud Computing
DOI:
https://doi.org/10.26438/ijcse/v6i9.723731Keywords:
Cloud Computing, 2FA Secure Data Storage Cloud, Server, DSA, Encryption and Decryption Algorithm Cloud StorageAbstract
Cloud computing is a new modern and broad concept of the world. Users store huge amount of data on cloud storage for future use. Now a day’s privacy to the data stored in cloud is an aspect and security is a very major challenging mission in cloud computing. These challenges have huge effect in the development of secure data storage qualities of cloud system. The objective of this paper is to provide the privacy two factor authentication (2FA) techniques algorithm for the cloud environment with an attempt to bring solutions of such problems. The main aim of this paper is to design and propose TwoFactor Authentication (2FA) technology with One-Time Password (OTP) and finger print for providing strong security system to the data stored in cloud system. This paper, presents two modules, the first module deals with ensuring the storing security of data in encrypted format by using the (2FA) technique and the second module with digital signature algorithm (DSA). We have proposed framework which provides, verifies user authenticity using two-step verification, which is based on password, CSP level key establishment between the users and the cloud server.
References
[1] M.S. Monisha, S. Chidambaram,“Enhanced Data Security using RSA Digital Signature with Robust Reversible Watermarking
Algorithm in Cloud Environment”, International Journal of Electronics & Co mmunication Technology, Vol.8, Issue 1, pp.2024, 2017.
[2] M. Singhal, S. Tapaswi,“Software Tokens Based Two Factor Authentication Scheme”,International Journal of Information and Electronics Engineering, Vol.2, No. 3,pp.383-386, 2012.
[3] N. Mashhadi,“Authentication in mobile cloud computing by combining the tow factor Authentication and one time password token”,Vol.37, Part 2 pp. 220−229, 2015.
[4] Y. Kale, A. B. Patankar, “Enhanced Data Security Mechanism on Cloud using two-factor authentication, data encryption and key Sharing Mechanism”, Proceedings of 11th IRF International Conference, ISBN: 978-93-84209-27-8, pp.158- 161, 2014.
[5] A.Padmapriya, P.Subhasri, “Cloud Computing: Reverse Caesar Cipher Algorithm to Increase Data Security”, International Journal of Engineering Trends and Technology, Vol.4 Issue4, pp.1067- 1071, 2013.
[6] L. Arockiam, S. Monikandan,“Data Security and Privacy in Cloud Storage using Hybrid Symmetric Encryption Algorithm”, International Journal of Advanced Research in Computer and Communication Engineering, Vol.2, Issue 8, pp. 3064-3070, 2013.
[7] T. Sivasakthi, N. Prabakaran, “Applying Digital Signature with Encryption Algorithm of User Authentication for Data Security in
Cloud Computing”, International Journal of Innovative Research in Computer and Communication Engineering,Vol. 2, Issue 2, pp. 3102- 3107,2014.
[8] M. A. Acha, M. J. Po, “Two (2)-Factor Authentication for Cloud Storage”, researchGate,2016.
[9] G. Saini, N. Sharma, “Triple Security of Data in Cloud Computing” ,International Journal of Computer Science and Information Technologies, Vol.5 Issue 4, pp. 5825-5827, 2014.
[10] A. Chaturvedi, D. N. Goswami, R. P. Sarang, “Privacy Algorithms to Improve the Secure Framework for Cloud Computing
Environment”,
International Journal of Advanced Research in Computer and Communication Engineering, Vol.6, Issue 4,pp.63-69, 2017.
[11] D. Patil, P.K.Deshmukh, “Data Security in Cloud Using Attribute Based Encryption with Efficient Keyword Search”, International Journal of Scientific & Engineering Research, Vol.7, Issue 1, pp. 986-991, 2016.
[12] N. Nagar, U. Suman, “A Secure Mobile Cloud Storage Environment using Encryption Algorithm”, International Journal of Computer Applications, Vol.140, No.8, pp.33-43, 2016.
[13] A. Khodwe, V.R.Wadhankar, “Security Enhancement for Privacy Preservation in Cloud Computing by Anonymous Request Access”, International Journal on Recent and Innovation Trends in Computing and Communication, Vol.4, Issue 1, pp. 233-237, 2016.
[14] An Braeken, A. Touhafi, “ Efficient Anonymous User Authentication on Server Without Secure Channel During Registration”, IEEE, 978-1-4673-8894-8, 2016.
[15] R. Sugumar, K. A. M. Joycee, “DSCESEA: Data Security in
Cloud using Enhanced Symmetric Encryption Algorithm”, International Journal of Engineering Research & Technology, Vol.6, Issue 10, pp. 292-295, 2017.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
