An Efficient Two - Factor Access Control For Web-Based Cloud Computing Services Using Jar File

Authors

  • V. Arulsakthi   Muthayammal Engineering College, Rasipuram, Rasipuram, Tamil Nadu, India
  • K. Sudha   Muthayammal Engineering College, Rasipuram, Rasipuram, Tamil Nadu, India

Keywords:

Web-Based Cloud Computing, Factor Access Control , Cloud Computing, Authentication

Abstract

Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the internet. This computing paradigm also conveys many new challenges for data security and access control. The users are outsourcing sensitive data for sharing on cloud servers, which are not within the same trusted domain as original data. To keep sensitive user data confidential against entrusted servers. Existing solutions usually apply cryptographic methods by disclosing data decryption keys only to authorize users. However, in this performance these solutions unoriginally introduce a heavy computation overhead on the sensitive data for key distribution and data management. These problems are not simultaneously achieving the data confidentiality of access control actually still remains unresolved. Analyzed how the existing schemes secure against the key-logger, shoulder-surfing attacks, and multiple attacks. The proposed system illuminates to implement the secret key using JAR file application instead device for web based access control protocol. Main purpose of the existing system to proposed system is complications in carrying the device to everywhere, to avoid non- accessibility through the physical damage and loss of the device. In the proposed system secret key is developed using JAR file application developed with blowfish algorithm scheme for encryption and decryption.

References

  1. J. Baek, Q. H. Vu, J. K. Liu, X. Huang, and Y. Xiang. A secure cloud computing based framework for big data information management of smart grid. IEEE T. Cloud Computing, 3(2):233–244,2015.
  2. J. Bethencourt.A. Sahai, and B. Waters. Ciphertext-policy attribute-based encryption. In IEEE Symposium on Security and Privacy, pages 321–334. IEEE Computer Society, 2007.
  3. D. Boneh, X. Ding, and G. Tsudik. Fine-grained control of security capabilities. ACM Trans. Internet Techn., 4(1):60–82, 2004.
  4. K. Joseph, Liu, Man Ho Au, Xinyi Huang, Rongxing Lu, Jin Li. Fine –grained two- factor access control for web based cloud computing services. journal 1556-6013(C).IEEE 2016.
  5. Y. Chen, Z. L. Jiang, S. Yiu, J. K. Liu, M. H. Au, and X. Wang. Fully secure ciphertext-policy attribute based encryption with security mediator. In ICICS ‘14, volume 8958 of Lecture Notes in Computer Science, pages 274–289. Springer, 2014.
  6. R. Cramer, I. Damgard, and P. D. MacKenzie. Ef?cient zeroknowledge proofs of knowledge without intractability assumptions. In H. Imai and Y. Zheng, editors, Public Key Cryptography, volume 1751 of Lecture Notes in Computer Science, pages 354–373. Springer, 2000.

Downloads

Published

2017-04-30

Issue

Section

Research Articles

How to Cite

[1]
V. Arulsakthi , K. Sudha , " An Efficient Two - Factor Access Control For Web-Based Cloud Computing Services Using Jar File , IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 2, pp.901-905, March-April-2017.