DESIGN AND IMPLEMENTATION OF AN OTP BASED DATA SECURITY MODEL INCOPERATING AES AND SHA2 IN CLOUD ENVIRONMENT

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2018, Vol 17, Issue 1

Abstract

Cloud computing has revolutionized the way computing and software services are delivered to the clients on demand. It offers users the ability to connect to computing resources and access IT managed services with a previously unknown level of ease. Thus, security concerns among users of the cloud have become a major barrier to the widespread growth of cloud computing. In this research work, we have used the 3 step security mechanism for the keeping the data secure at the cloud. We have implemented the strong authentication mechanism using AES encrypted OTP and enhanced the security of data using Cloud Broker and AES. When you log on to your machine and then try to access a resource, say a file server or database, something needs to assure that your username and password are valid. With sensitive data stored in the cloud of the different users, we need a strong authentication mechanism along with OTP. Data breaches because of no/weak authentication. Afterwards we have verified the integrity of data stored at cloud provider using SHA2. Multiple parameters like processing time, processing cost, AES encryption time, OTP generation and encryption time have been calculated and analyzed. We have been able to enhance the security by optimizing the processing time as well as processing cost. After implementing the proposed methodology, it has been summarized that the cloud security can be enhanced by applying the proposed mechanism. The proposed system has reduced the complexity, processing cost which increases the overall efficiency of the system.

Authors and Affiliations

Jaspreet Kaur, Navdeep Kaler

Keywords

Related Articles

Enhancement Electronic evaluation for Semantic Arabic Oral Exam

From the importance of knowledge in the speech, we knew the importance of oral exam. So in this paper we integrated BOW (Bag of Word), LSA(Latin Semantic Analysis), ASR (automatic speech recognition), zero crossing rate,...

Security of Web Services: Methods and Contrivance

The increasing use of web services, the proved advantages of service-oriented architectures and continuously appliedattacks to them require utilization of given secure mechanisms that ensure the security at different lev...

Study on Non Functional Software Testing

Improving software quality involves reducing the quantity of defects within the final product and identifying the remaining defects as early as possible. It involves both its functionality and its non-functional characte...

TAXONOMY FOR WSN SECURITY-A SURVEY

WSN is one of the dominant and emerging technology that shows great promise for  various application in military, ecological and health related areas.WSN is highly vulnerable to attacks and inclusion of wireless communi...

Software Quality: Issues, Concerns and New Directions

Software metrics and quality models have a very important role to play in measurement of software quality. A number of well-known quality models and software metrics are used to build quality software both in industry an...

Download PDF file
  • EP ID EP650947
  • DOI 10.24297/ijct.v17i1.6930
  • Views 90
  • Downloads 0

How To Cite

Jaspreet Kaur, Navdeep Kaler (2018). DESIGN AND IMPLEMENTATION OF AN OTP BASED DATA SECURITY MODEL INCOPERATING AES AND SHA2 IN CLOUD ENVIRONMENT. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 17(1), 7081-7091. https://europub.co.uk/articles/-A-650947