Providing Security Using Fine Grained Two factor Access Control in Cloud Computing Environment

Authors

  • Varsha  Department of Master of Computer Application (MCA), VTU PG Centre Kalaburagi, Karnataka, India

Keywords:

Cloud Computing, Encryption Algorithm, 2FA, E-banking, Secret Key

Abstract

Cloud computing has the major security problem. From the cloud the information can be shared easily. Sharing of information only leads big security problem in cloud computing. The data can easily be hacked by the hackers. In this project we are providing more efficient security to the cloud. We are introducing a project of providing security using fine grained two factor access control for cloud computing environment. The main problem is, the user need to login before entering into the server and sharing the same computer between many people. Only password scheme is not much safe for cloud. By considering the problem, we are proposing a concept of 2FA access which means along with the password scheme the user need to keep the safety device which generates the one time password for the user. Through that the user can enter into the server and he can able to download the necessity files from the cloud. Using salt Encryption Algorithm we are solving the problem and providing security to the cloud.

References

  1. M. H. Au and A. Kapadia, "PERM: Practical notoriety based boycotting without TTPS," in Proc. ACM Conf. Comput. Commun.Secur.(CCS), Raleigh, NC, USA, Oct. 2012, pp. 929- 940.
  2. M. H. Au, A. Kapadia, and W. Susilo, "BLACR: sans ttp blacklistable mysterious accreditations with notoriety," in Proc. nineteenth NDSS, 2012, pp. 1-17.
  3. M. H. Au, W. Susilo, and Y. Mu, "Steady size dynamic k-TAA," inProc. fifth Int. Conf. SCN, 2006, pp. 111-125. 4] J. Baek, Q. H. Vu, J. K. Liu, X. Huang, and Y. Xiang, "A protected distributed computing based system for enormous information data administration of brilliant network," IEEE Trans. Cloud Comput., vol. 3, no. 2, pp. 233-244, Apr./Jun. 2015.
  4. M. Bellare and O. Goldreich, "On characterizing evidences of learning," I Proc. twelfth Annu. Int. CRYPTO, 1992, pp. 390-420.
  5. J. Be, and B. Waters, "Ciphertext-approach attributebased encryption," in Proc. IEEE Symp.Secur. Security, May 2007, pp. 321-334.
  6. D. Boneh, and Shacham, "Short gathering marks,"
  7. in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 2004, pp. 41-55.
  8. D. Boneh, X. Ding, and G. Tsudik, "Fine-grained control of security abilities," ACM Trans. Web Technol., vol. 4, no. 1, pp. 60-82, 2004.
  9. J. Camenisch, "Aggregate mark plans and installment frameworks in view of the distinct logarithm issue," Ph.D. exposition, ETH Zurich, Zürich, Switzerland, 1998.
  10. J. Camenisch, M. Dubovitskaya, and G. Neven, "Negligent exchange with get to control," in Proc. sixteenth ACM Conf. Comput.Commun.Secur.(CCS), il, USA, November. 2009, pp. 131-140.

Downloads

Published

2017-08-31

Issue

Section

Research Articles

How to Cite

[1]
Varsha, " Providing Security Using Fine Grained Two factor Access Control in Cloud Computing Environment, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 4, pp.418-423, July-August-2017.