Enhanced two Factor Authentication and Authorization Technique to Secure Data in Cloud

Authors

  • Mohd Azheruddin Adil  M.Tech Scholar, Department of Computer Science & Engineering, Shadan College of Engineering & Technology, Hyderabad, Telangana, India
  • Md Ateeq Ur Rahman  Professor, Department of Computer Science & Engineering, Shadan College of Engineering & Technology, Hyderabad, Telangana, India

Keywords:

Authentication, Authorization, Two Step Verification, Second Step Validation, Secure Message Sending, Secure Authentication, Data Encryption.

Abstract

There are numerous techniques available to provide authentication level security to the various applications over a cloud. A more secure route is to utilize two-factor validation (2FA). 2FA is exceptionally regular among online e-keeping money administrations. Notwithstanding a username/secret key, the client is additionally required to have a gadget to show a one-time password. A few frameworks may require the client to have a cell phone while the one-time secret key will be sent to the cell phone through SMS amid the login procedure. By utilizing 2FA, clients will have more confidence to utilize shared PCs to login for online e-keeping money administrations. For a similar reason, it will be smarter to have a 2FA framework for clients in the online cloud benefits keeping in mind the end goal to build the security level in the framework. To Ensure Application and Data Security is the main objective of this paper. Data Owners gets verified every time by using 2FA technique for login or downloading any data. This process of authentication guarantees high level security to the application from anonymous users on the web.

References

  1. Y. Dodis and A. Yampolskiy, proposed a paper "A verifiable random function with short proofs and keys," in Public Key Cryptography (Lecture Notes in Computer Science), vol. 3386, S. Vaudenay, Ed. Berlin, Germany: Springer-Verlag, 2005, pp. 416-431.
  2. X. Huang et al., proposed a paper "Cost-effective authentic and anonymous data sharing with forward security," IEEE Trans. Compute., vol. 64, no. 4, pp. 971-983, Apr. 2015.
  3. F. Xhafa, J. Wang, X. Chen, J. K. Liu, J. Li, and P. Krause, proposed a paper "An efficient PHR service system supporting fuzzy keyword search and fine-grained access control," Soft Compute., vol. 18, no. 9, pp. 1795-1802, 2014.
  4. M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, proposed a paper "Scalable and secure sharing of personal health records in cloud computing using attribute based encryption," IEEE Trans.

Downloads

Published

2017-12-31

Issue

Section

Research Articles

How to Cite

[1]
Mohd Azheruddin Adil, Md Ateeq Ur Rahman, " Enhanced two Factor Authentication and Authorization Technique to Secure Data in Cloud, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, pp.154-158 , November-December-2017.