Providing Security Using Fine Grained Two factor Access Control in Cloud Computing Environment

Authors(1) :-Varsha

Cloud computing has the major security problem. From the cloud the information can be shared easily. Sharing of information only leads big security problem in cloud computing. The data can easily be hacked by the hackers. In this project we are providing more efficient security to the cloud. We are introducing a project of providing security using fine grained two factor access control for cloud computing environment. The main problem is, the user need to login before entering into the server and sharing the same computer between many people. Only password scheme is not much safe for cloud. By considering the problem, we are proposing a concept of 2FA access which means along with the password scheme the user need to keep the safety device which generates the one time password for the user. Through that the user can enter into the server and he can able to download the necessity files from the cloud. Using salt Encryption Algorithm we are solving the problem and providing security to the cloud.

Authors and Affiliations

Department of Master of Computer Application (MCA), VTU PG Centre Kalaburagi, Karnataka, India

Cloud Computing, Encryption Algorithm, 2FA, E-banking, Secret Key

  1. M. H. Au and A. Kapadia, "PERM: Practical notoriety based boycotting without TTPS," in Proc. ACM Conf. Comput. Commun.Secur.(CCS), Raleigh, NC, USA, Oct. 2012, pp. 929- 940.
  2. M. H. Au, A. Kapadia, and W. Susilo, "BLACR: sans ttp blacklistable mysterious accreditations with notoriety," in Proc. nineteenth NDSS, 2012, pp. 1-17.
  3. M. H. Au, W. Susilo, and Y. Mu, "Steady size dynamic k-TAA," inProc. fifth Int. Conf. SCN, 2006, pp. 111-125. 4] J. Baek, Q. H. Vu, J. K. Liu, X. Huang, and Y. Xiang, "A protected distributed computing based system for enormous information data administration of brilliant network," IEEE Trans. Cloud Comput., vol. 3, no. 2, pp. 233-244, Apr./Jun. 2015.
  4. M. Bellare and O. Goldreich, "On characterizing evidences of learning," I Proc. twelfth Annu. Int. CRYPTO, 1992, pp. 390-420.
  5. J. Be, and B. Waters, "Ciphertext-approach attributebased encryption," in Proc. IEEE Symp.Secur. Security, May 2007, pp. 321-334.
  6. D. Boneh, and Shacham, "Short gathering marks,"
  7. in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 2004, pp. 41-55.
  8. D. Boneh, X. Ding, and G. Tsudik, "Fine-grained control of security abilities," ACM Trans. Web Technol., vol. 4, no. 1, pp. 60-82, 2004.
  9. J. Camenisch, "Aggregate mark plans and installment frameworks in view of the distinct logarithm issue," Ph.D. exposition, ETH Zurich, Zürich, Switzerland, 1998.
  10. J. Camenisch, M. Dubovitskaya, and G. Neven, "Negligent exchange with get to control," in Proc. sixteenth ACM Conf. Comput.Commun.Secur.(CCS), il, USA, November. 2009, pp. 131-140.

Publication Details

Published in : Volume 2 | Issue 4 | July-August 2017
Date of Publication : 2017-08-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 418-423
Manuscript Number : CSEIT172488
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Varsha, "Providing Security Using Fine Grained Two factor Access Control in Cloud Computing Environment", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 4, pp.418-423, July-August-2017.
Journal URL :

Article Preview