IJSRSET calls volunteers interested to contribute towards the scientific development in the field of Science, Engineering and Technology

Home > IJSRSET1623137                                                     


Transient Authentication for Cloud Security

Authors(4):

Rishikesh Shukla, Atul Dobhal, Ankit Rai, Ankur Srivastava
  • Abstract
  • Authors
  • Keywords
  • References
  • Details
Cloud Computing becomes the next generation architecture of IT Enterprise. In contrast to traditional solutions, Cloud computing moves the application software and databases to the large data centres, where the management of the data and services may not be fully trustworthy. This unique feature, however, raises many new security challenges which have not been well understood. In cloud computing, both data and software are fully not contained on the user's computer; Data Security concerns arises because both user data and program are residing in Provider Premises. Clouds typically have single security architecture but have many customers with different demands. Every cloud provider solves this problem by encrypting the data by using encryption algorithms. Even multi-tenancy feature of cloud give rise to security issue related to data and also the authentication of users. We provide a secure scheme which protects the sensitive data of the user stored in the cloud. We solve the problem which existing systems faces with Transient Authentication, in which a small hardware token (Mobile Phone) continuously authenticates the userís presence over a short-range, wireless link to the machine through which the user is accessing cloud. This machine in turn provides this authentication information to cloud. When the user departs, the token and machine lose contact and the machine stops exchanging the information with cloud making the data secure. We show how to leverage this authentication framework to secure sensitive and confidential data on to the cloud.

Rishikesh Shukla, Atul Dobhal, Ankit Rai, Ankur Srivastava

Cloud Computing, Transient System, Token, RSA Algorithm

  1. M. Baker, R. Buyya, and D. Laforenza, "Grids and gridtechnologies for wide-area distributed computing,"International Journal of Software: Practice andExperience, vol.32, pp. 1437-1466, 2002.
  2. C. S. Yeo, S. Venugopal, X. Chu, and R. Buyya,"Autonomic metered pricing for a utility computing service", Future Generation Computer Systems, vol. 26,issue 8, pp. 1368-1380, October 2010.
  3. R. Sterritt, "Autonomic computing," Innovations in Systems and Software Engineering, vol. 1, no. 1,Springer, pp. 79-88. 2005.
  4. William Stallings, lawrieBrown,"Computer Security", Pearson.

Publication Details

Published in : Volume 2 | Issue 3 | May-June - 2016
Date of Publication Print ISSN Online ISSN
2016-06-30 2395-1990 2394-4099
Page(s) Manuscript Number   Publisher
458-464 IJSRSET1623137   Technoscience Academy

Cite This Article

Rishikesh Shukla, Atul Dobhal, Ankit Rai, Ankur Srivastava, "Transient Authentication for Cloud Security", International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 2, Issue 3, pp.458-464, May-June-2016.
URL : http://ijsrset.com/IJSRSET1623137.php

IJSRSET Xplore

Subscribe

Conferences

National Conference on Advances in Mechanical Engineering 2017(NCAME 2017)

National Conference on Emerging Trends in Civil Engineering 2017( NCETCE 2017)