Improved Authentication and Protection of Data in the Cloud

Authors

  • K Dronam Raj  JNTUA College of Engineering, Ananthapuram, Andhra Pradesh, Andhra Pradesh, India
  • C Shoba Bindu  JNTUA College of Engineering, Ananthapuram, Andhra Pradesh, Andhra Pradesh, India
  • P Dileep Kumar Reddy  JNTUA College of Engineering, Ananthapuram, Andhra Pradesh, Andhra Pradesh, India

Keywords:

Cloud Computing, Two-Factor Authentication, Advanced Encryption Standard, Man-in-Middle attack.

Abstract

In 2016 Perez et.al proposed a data-centric access control scheme for self- protected data that can run in untrusted CSPs. Their scheme is vulnerable to Man-in-Middle attack and uses more complex encryption methodologies. So this paper presents a solution in which security is focused on protecting the user data regardless of the cloud service provider that holds it. The solution in this paper takes advantage of Two-Factor Authentication (2FA) and encryption of data to be uploaded to cloud using Advanced Encryption Standard (AES).

References

  1. C Shoba Bindu P. Chandra sekhar Reddy B.Satyanarayana "Improving Remote User Authentication Scheme preserving user anonymity" IJCSNS International journal,Vol.8 No.3, March 2008.
  2. Juan M. Marin Perez gregorio Martinez Perez Antonio F. Skarmea Gomez "SecRBAC: Secure data in the Clouds" IEEE Transactions , DOI 10.1109/TC.2016.2553668.
  3. P. S. Wooley, "Identifying Cloud Computing Security Risks," Contin. Educ., vol. 1277, no. February, 2011.
  4. F. Sabahi, "Virtualization-level security in cloud computing," 2011 IEEE 3rd Int. Conf. Commun. Softw. Networks, pp. 250–254, 2011.
  5. Cloud Security Alliance, "The Notorious Nine. Cloud Computing Top Threats in 2013," Security, no. February, pp. 1–14, 2013.
  6. A. U. Khan, M. Oriol, M. Kiran, M. Jiang, and K. Djemame, "Security risks and their management in cloud computing," 4th IEEE Int. Conf. Cloud Comput. Technol. Sci. Proc., pp. 121–128, 2012.
  7. T. Mather, S. Kumaraswamy, and S. Latif, "Cloud Security and Privacy," p. 299, 2009.

Downloads

Published

2017-08-31

Issue

Section

Research Articles

How to Cite

[1]
K Dronam Raj, C Shoba Bindu, P Dileep Kumar Reddy, " Improved Authentication and Protection of Data in the Cloud, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 3, Issue 5, pp.506-510, July-August-2017.