Improved Authentication and Protection of Data in the Cloud

Authors(3) :-K Dronam Raj, C Shoba Bindu, P Dileep Kumar Reddy

In 2016 Perez et.al proposed a data-centric access control scheme for self- protected data that can run in untrusted CSPs. Their scheme is vulnerable to Man-in-Middle attack and uses more complex encryption methodologies. So this paper presents a solution in which security is focused on protecting the user data regardless of the cloud service provider that holds it. The solution in this paper takes advantage of Two-Factor Authentication (2FA) and encryption of data to be uploaded to cloud using Advanced Encryption Standard (AES).

Authors and Affiliations

K Dronam Raj
JNTUA College of Engineering, Ananthapuram, Andhra Pradesh, Andhra Pradesh, India
C Shoba Bindu
JNTUA College of Engineering, Ananthapuram, Andhra Pradesh, Andhra Pradesh, India
P Dileep Kumar Reddy
JNTUA College of Engineering, Ananthapuram, Andhra Pradesh, Andhra Pradesh, India

Cloud Computing, Two-Factor Authentication, Advanced Encryption Standard, Man-in-Middle attack.

  1. C Shoba Bindu P. Chandra sekhar Reddy B.Satyanarayana "Improving Remote User Authentication Scheme preserving user anonymity" IJCSNS International journal,Vol.8 No.3, March 2008.
  2. Juan M. Marin Perez gregorio Martinez Perez Antonio F. Skarmea Gomez "SecRBAC: Secure data in the Clouds" IEEE Transactions , DOI 10.1109/TC.2016.2553668.
  3. P. S. Wooley, "Identifying Cloud Computing Security Risks," Contin. Educ., vol. 1277, no. February, 2011.
  4. F. Sabahi, "Virtualization-level security in cloud computing," 2011 IEEE 3rd Int. Conf. Commun. Softw. Networks, pp. 250254, 2011.
  5. Cloud Security Alliance, "The Notorious Nine. Cloud Computing Top Threats in 2013," Security, no. February, pp. 114, 2013.
  6. A. U. Khan, M. Oriol, M. Kiran, M. Jiang, and K. Djemame, "Security risks and their management in cloud computing," 4th IEEE Int. Conf. Cloud Comput. Technol. Sci. Proc., pp. 121128, 2012.
  7. T. Mather, S. Kumaraswamy, and S. Latif, "Cloud Security and Privacy," p. 299, 2009.

Publication Details

Published in : Volume 3 | Issue 5 | July-August 2017
Date of Publication : 2017-08-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 506-510
Manuscript Number : IJSRSET1734123
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

K Dronam Raj, C Shoba Bindu, P Dileep Kumar Reddy, " Improved Authentication and Protection of Data in the Cloud, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 3, Issue 5, pp.506-510, July-August-2017.
Journal URL : http://ijsrset.com/IJSRSET1734123

Follow Us

Contact Us