Enhanced two Factor Authentication and Authorization Technique to Secure Data in Cloud

Authors(2) :-Mohd Azheruddin Adil, Md Ateeq Ur Rahman

There are numerous techniques available to provide authentication level security to the various applications over a cloud. A more secure route is to utilize two-factor validation (2FA). 2FA is exceptionally regular among online e-keeping money administrations. Notwithstanding a username/secret key, the client is additionally required to have a gadget to show a one-time password. A few frameworks may require the client to have a cell phone while the one-time secret key will be sent to the cell phone through SMS amid the login procedure. By utilizing 2FA, clients will have more conīŦdence to utilize shared PCs to login for online e-keeping money administrations. For a similar reason, it will be smarter to have a 2FA framework for clients in the online cloud benefits keeping in mind the end goal to build the security level in the framework. To Ensure Application and Data Security is the main objective of this paper. Data Owners gets verified every time by using 2FA technique for login or downloading any data. This process of authentication guarantees high level security to the application from anonymous users on the web.

Authors and Affiliations

Mohd Azheruddin Adil
M.Tech Scholar, Department of Computer Science & Engineering, Shadan College of Engineering & Technology, Hyderabad, Telangana, India
Md Ateeq Ur Rahman
Professor, Department of Computer Science & Engineering, Shadan College of Engineering & Technology, Hyderabad, Telangana, India

Authentication, Authorization, Two Step Verification, Second Step Validation, Secure Message Sending, Secure Authentication, Data Encryption.

  1. Y. Dodis and A. Yampolskiy, proposed a paper "A verifiable random function with short proofs and keys," in Public Key Cryptography (Lecture Notes in Computer Science), vol. 3386, S. Vaudenay, Ed. Berlin, Germany: Springer-Verlag, 2005, pp. 416-431.
  2. X. Huang et al., proposed a paper "Cost-effective authentic and anonymous data sharing with forward security," IEEE Trans. Compute., vol. 64, no. 4, pp. 971-983, Apr. 2015.
  3. F. Xhafa, J. Wang, X. Chen, J. K. Liu, J. Li, and P. Krause, proposed a paper "An efficient PHR service system supporting fuzzy keyword search and fine-grained access control," Soft Compute., vol. 18, no. 9, pp. 1795-1802, 2014.
  4. M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, proposed a paper "Scalable and secure sharing of personal health records in cloud computing using attribute based encryption," IEEE Trans.

Publication Details

Published in : Volume 2 | Issue 6 | November-December 2017
Date of Publication : 2017-12-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 154-158
Manuscript Number : CSEIT172665
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Mohd Azheruddin Adil, Md Ateeq Ur Rahman, "Enhanced two Factor Authentication and Authorization Technique to Secure Data in Cloud", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, pp.154-158 , November-December.2017
URL : http://ijsrcseit.com/CSEIT172665

Follow Us

Contact Us