Multi-Authentication for Cloud Security: A Framework

Abstract

Cloud computing is a multi-tenant computational paradigm that offers an efficient, elastic and scalable business model for organizations to adopt various information technology (IT) resources i.e. software, hardware, network, storage, bandwidth etc. There are various aspects of security problem in cloud computing field which include data security, privacy and users’ authenticity. The purpose of this research paper is to construct a framework for secure and more advanced authentication scheme for executing secure transactions in a cloud environment. For any cloud service which deals with personal and private information exchange, single tier authentication is not adequate. Authentication schemes that imply more than one tier for authentication are comparatively safer than single tier authentication scheme. This work proposes a scheme in which authentication process is carried out in two levels or two tiers. First tier uses simple username and password on a standard cloud user’s interface. Second tier is use of any personal device like mobile which have a unique id and in possession of the authenticated user only. The advantage of this scheme is that it enhances the strength of authentication as if cloud server has to authenticate the standard user password and id as well as the associated device’s id and password simultaneously with each other.

Authors and Affiliations

Satish Kumar , Anita Ganpati

Keywords

Related Articles

Image fusion by Denoising and Segmentation

With the recent rapid developments in the field of sensing technologies, multisensory systems have become a reality in a growing number of fields such as remote sensing, medical imaging, machine vision and the military a...

A Survey on Under Water Images Enhancement Techniques 

The Major causes for the underwater images are light scattering and color change. One of the methods of improving quality of the image is image enhancement. This paper presents a comparative study of various image enhanc...

Secure Routing Using ASOR Protocol for MANETs

Privacy protection is one of the critical issues in Mobile Adhoc Networks. To provide unobservability and unlinkability on the network was the major requirements. Although ,there was number of secure protocols available...

BLOCKING ARTIFACT DETECTION METHOD FOR HIGHLY COMPRESSED IMAGES

Blocking artifacts severely reduce the visual quality of the image making it unpleasant to the viewer. Reduction of blocking artifacts is essential to render the compressed image or video acceptable to the human viewer....

AUTOMATIC DETECTION AND PREVENTION OF VIRUS IN MOBILE ENVIRONMENT

Mobile phone becomes an essential device for everyone due to the need and drastic growth of technology. Mobile phones have truly transformed the mode of communications. It becomes the basic requirement of life. It is ver...

Download PDF file
  • EP ID EP157758
  • DOI -
  • Views 121
  • Downloads 0

How To Cite

Satish Kumar, Anita Ganpati (2014). Multi-Authentication for Cloud Security: A Framework. International Journal of Computer Science & Engineering Technology, 5(4), 295-303. https://europub.co.uk/articles/-A-157758