Multi-Authentication for Cloud Security: A Framework
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 4
Abstract
Cloud computing is a multi-tenant computational paradigm that offers an efficient, elastic and scalable business model for organizations to adopt various information technology (IT) resources i.e. software, hardware, network, storage, bandwidth etc. There are various aspects of security problem in cloud computing field which include data security, privacy and users’ authenticity. The purpose of this research paper is to construct a framework for secure and more advanced authentication scheme for executing secure transactions in a cloud environment. For any cloud service which deals with personal and private information exchange, single tier authentication is not adequate. Authentication schemes that imply more than one tier for authentication are comparatively safer than single tier authentication scheme. This work proposes a scheme in which authentication process is carried out in two levels or two tiers. First tier uses simple username and password on a standard cloud user’s interface. Second tier is use of any personal device like mobile which have a unique id and in possession of the authenticated user only. The advantage of this scheme is that it enhances the strength of authentication as if cloud server has to authenticate the standard user password and id as well as the associated device’s id and password simultaneously with each other.
Authors and Affiliations
Satish Kumar , Anita Ganpati
Detect and prevent HELLO FLOOD Attack using Centralized technique in WSN
In wireless sensor networks, wirelessly nodes communicate with each other. WSN is a very large array of diverse sensor nodes that are interconnected by a communication network . The battery lifetime of nodes in wireless...
“Automatic Question Generation from Punjabi Text :A Review”
Question generation is an application of the NLP (Natural Language Processing). In automatic question generation the system generate multiple choice questions automatically from Punjabi text using question generation tec...
Knowledge Representation for the tool used for Requirement Segregation in Software Development Process
Software development is the major activity of Information Technology. We can engineer the software with the help of various process models. System Development Life Cycle (SDLC) is the base for all process models. All the...
Secure Routing Using ASOR Protocol for MANETs
Privacy protection is one of the critical issues in Mobile Adhoc Networks. To provide unobservability and unlinkability on the network was the major requirements. Although ,there was number of secure protocols available...
Effort Reduction by Automatic Code Generation
The emergence of Unified Modelling Language (UML) as a standard for modelling systems has encouraged the use of automated software tools that facilitate the development process from analysis through coding. In our approa...