Improved Authentication and Protection of Data in the Cloud
Keywords:
Cloud Computing, Two-Factor Authentication, Advanced Encryption Standard, Man-in-Middle attack.Abstract
In 2016 Perez et.al proposed a data-centric access control scheme for self- protected data that can run in untrusted CSPs. Their scheme is vulnerable to Man-in-Middle attack and uses more complex encryption methodologies. So this paper presents a solution in which security is focused on protecting the user data regardless of the cloud service provider that holds it. The solution in this paper takes advantage of Two-Factor Authentication (2FA) and encryption of data to be uploaded to cloud using Advanced Encryption Standard (AES).
References
- C Shoba Bindu P. Chandra sekhar Reddy B.Satyanarayana "Improving Remote User Authentication Scheme preserving user anonymity" IJCSNS International journal,Vol.8 No.3, March 2008.
- Juan M. Marin Perez gregorio Martinez Perez Antonio F. Skarmea Gomez "SecRBAC: Secure data in the Clouds" IEEE Transactions , DOI 10.1109/TC.2016.2553668.
- P. S. Wooley, "Identifying Cloud Computing Security Risks," Contin. Educ., vol. 1277, no. February, 2011.
- F. Sabahi, "Virtualization-level security in cloud computing," 2011 IEEE 3rd Int. Conf. Commun. Softw. Networks, pp. 250–254, 2011.
- Cloud Security Alliance, "The Notorious Nine. Cloud Computing Top Threats in 2013," Security, no. February, pp. 1–14, 2013.
- A. U. Khan, M. Oriol, M. Kiran, M. Jiang, and K. Djemame, "Security risks and their management in cloud computing," 4th IEEE Int. Conf. Cloud Comput. Technol. Sci. Proc., pp. 121–128, 2012.
- T. Mather, S. Kumaraswamy, and S. Latif, "Cloud Security and Privacy," p. 299, 2009.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.