Transient Authentication for Cloud Security

Authors

  • Rishikesh Shukla  Computer Department, Bharati Vidhyapeeth College of Engineering Lavale Pune, Maharashtra, India
  • Atul Dobhal  Computer Department, Bharati Vidhyapeeth College of Engineering Lavale Pune, Maharashtra, India
  • Ankit Rai  Computer Department, Bharati Vidhyapeeth College of Engineering Lavale Pune, Maharashtra, India
  • Ankur Srivastava  Computer Department, Bharati Vidhyapeeth College of Engineering Lavale Pune, Maharashtra, India

Keywords:

Cloud Computing, Transient System, Token, RSA Algorithm

Abstract

Cloud Computing becomes the next generation architecture of IT Enterprise. In contrast to traditional solutions, Cloud computing moves the application software and databases to the large data centres, where the management of the data and services may not be fully trustworthy. This unique feature, however, raises many new security challenges which have not been well understood. In cloud computing, both data and software are fully not contained on the user's computer; Data Security concerns arises because both user data and program are residing in Provider Premises. Clouds typically have single security architecture but have many customers with different demands. Every cloud provider solves this problem by encrypting the data by using encryption algorithms. Even multi-tenancy feature of cloud give rise to security issue related to data and also the authentication of users. We provide a secure scheme which protects the sensitive data of the user stored in the cloud. We solve the problem which existing systems faces with Transient Authentication, in which a small hardware token (Mobile Phone) continuously authenticates the user’s presence over a short-range, wireless link to the machine through which the user is accessing cloud. This machine in turn provides this authentication information to cloud. When the user departs, the token and machine lose contact and the machine stops exchanging the information with cloud making the data secure. We show how to leverage this authentication framework to secure sensitive and confidential data on to the cloud.

References

  1. M. Baker, R. Buyya, and D. Laforenza, "Grids and gridtechnologies for wide-area distributed computing,"International Journal of Software: Practice andExperience, vol.32, pp. 1437-1466, 2002.
  2. C. S. Yeo, S. Venugopal, X. Chu, and R. Buyya,"Autonomic metered pricing for a utility computing service", Future Generation Computer Systems, vol. 26,issue 8, pp. 1368-1380, October 2010.
  3. R. Sterritt, "Autonomic computing," Innovations in Systems and Software Engineering, vol. 1, no. 1,Springer, pp. 79-88. 2005.
  4. William Stallings, lawrieBrown,"Computer Security", Pearson.

Downloads

Published

2016-06-30

Issue

Section

Research Articles

How to Cite

[1]
Rishikesh Shukla, Atul Dobhal, Ankit Rai, Ankur Srivastava, " Transient Authentication for Cloud Security, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 2, Issue 3, pp.458-464, May-June-2016.