IJSRSET calls volunteers interested to contribute towards the scientific development in the field of Science, Engineering and Technology

Home > IJSRSET16222                                                     

Transient Authentication for Cloud Data Security


Rishikesh Shukla, Ankit Rai, Atul Dobhal, Ankur Srivastava, Prof. Uday Patkar
  • Abstract
  • Authors
  • Keywords
  • References
  • Details
Cloud Computing becomes the next generation architecture of IT Enterprise. In contrast to traditional solutions, Cloud computing moves the application software and databases to the large data centres, where the management of the data and services may not be fully trustworthy. This unique feature, however, raises many new security challenges which have not been well understood. In cloud computing, both data and software are fully not contained on the user's computer; Data Security concerns arises because both user data and program are residing in Provider Premises. Clouds typically have single security architecture but have many customers with different demands. Every cloud provider solves this problem by encrypting the data by using encryption algorithms. Even multi-tenancy feature of cloud give rise to security issue related to data and also the authentication of users.

We provide a secure scheme which protects the sensitive data of the user stored in the cloud. We solve the problem which existing systems faces with Transient Authentication, in which a small hardware token (Mobile Phone) continuously authenticates the user’s presence over a short-range, wireless link to the machine through which the user is accessing cloud. This machine in turn provides this authentication information to cloud. When the user departs, the token and machine lose contact and the machine stops exchanging the information with cloud making the data secure. We show how to leverage this authentication framework to secure sensitive and confidential data on to the cloud.

Rishikesh Shukla, Ankit Rai, Atul Dobhal, Ankur Srivastava, Prof. Uday Patkar

Cloud Computing, transient system, token , RSA Algorithm.

  1. M. Baker, R. Buyya, and D. Laforenza, “Grids and gridtechnologies for wide-area distributed computing,” International Journal of Software: Practice andExperience, vol.32, pp. 1437-1466, 2002.
  2. C. S. Yeo, S. Venugopal, X. Chu, and R. Buyya,"Autonomic metered pricing for a utility computing service", Future Generation Computer Systems, vol. 26,issue 8, pp. 1368-1380, October 2010.
  3. R. Sterritt, “Autonomic computing,” Innovations in Systems and Software Engineering, vol. 1, no. 1,Springer, pp. 79-88. 2005.
  4. William Stallings, lawrieBrown,”Computer Security”, Pearson

Publication Details

Published in : Volume 2 | Issue 2 | March-April - 2016
Date of Publication Print ISSN Online ISSN
2017-12-31 2395-1990 2394-4099
Page(s) Manuscript Number   Publisher
01-03 IJSRSET16222   Technoscience Academy

Cite This Article

Rishikesh Shukla, Ankit Rai, Atul Dobhal, Ankur Srivastava, Prof. Uday Patkar , "Transient Authentication for Cloud Data Security", International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 2, Issue 2, pp.01-03, March-April-2016.
URL : http://ijsrset.com/IJSRSET16222.php