Superior-Grained Dual-Factor Access Control Designed for Web-Based Cloud Computing Services

Authors(2) :-Gaddipathi Bharathi, Shaik Akbarul Riyaz

In this paper, we present another fine-grained two-variable validation (2FA) access control framework for electronic distributed computing administrations. In particular, in our proposed 2FA access control framework, a property based access control system is executed with the need of both a client secret key and a lightweight security device. As a client can't access the framework on the off chance that they do not hold both, the instrument can improve the security of the framework, particularly in those situations where numerous clients have the same PC for online cloud administrations. Likewise, characteristic based control in the framework too enables the cloud server to restrict the access to those clients with the same arrangement of properties while preserving client protection, i.e., the cloud server just realizes that the client satisfies the required predicate, however no clue has on the precise personality of the client. Finally, we likewise complete a simulation to exhibit the practicability of our proposed 2FA framework.

Authors and Affiliations

Gaddipathi Bharathi
Department of MCA , St. Mary's Group of Institutions, Guntur, Andhra Pradesh, India
Shaik Akbarul Riyaz
Department of MCA , St. Mary's Group of Institutions, Guntur, Andhra Pradesh, India

Fine-grained, two-factor, access control, Web services, ASA, RSA, DelfiHellman

  1. Kashif Munir and Prof Dr. Sellapan Palaniappan," FRAMEWORK FOR SECURE CLOUD COMPUTING", IJCCSA,Vol.3, No.2, April 2013.
  2. Mr. AnkushKudale, Dr. Binod Kumar," A STUDY ON AUTHENTICATION AND ACCESS CONTROL FOR CLOUD COMPUTING", Vol. 1(2), July 2014 (ISSN: 2321-8088).
  3. Harvinder Singh1, Amandeep Kaur2," Access Control Model for Cloud Platforms Using Multi-Tier Graphical Authentication", Volume 4 Issue 11, November 2015.
  4. Joseph K. Liu, Tsz Hon Yuen, Man Ho Au, Xinyi Huang, Willy Susilo, and JianyingZhou,"k-times attribute-based anonymous access control for cloud computing", IEEE Transactions on Computers, 64 (9), 2595-2608.
  5. J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute based encryption," in Proc. IEEE Symp.Secur. Privacy, May 2007, pp. 321-334.
  6. D. Boneh, X. Boyen, and H. Shacham, “Short group signatures," in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 2004, pp. 41- 55.
  7. D. Boneh, X. Ding, and G. Tsudik, “Fine-grained control of security capabilities," ACM Trans. Internet Technol., vol. 4, no. 1, pp. 60-82, 2004.
  8. J. Camenisch, “Group signature schemes and payment systems based on the discrete logarithm problem," Ph.D. dissertation, ETH Zurich, Zürich, Switzerland, 1998.
  9. J. Camenisch, M. Dubovitskaya, and G. Neven, “Oblivious transfer with access control," in Proc. 16th ACM Conf. Comput.Commun.Secur.(CCS), Chicago, IL, USA, Nov. 2009, pp. 131-140.

Publication Details

Published in : Volume 2 | Issue 4 | July-August 2017
Date of Publication : 2017-08-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 438-440
Manuscript Number : CSEIT1724103
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Gaddipathi Bharathi, Shaik Akbarul Riyaz, "Superior-Grained Dual-Factor Access Control Designed for Web-Based Cloud Computing Services", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 4, pp.438-440, July-August-2017.
Journal URL :

Article Preview