Multi-Authentication for Cloud Security: A Framework

Abstract

Cloud computing is a multi-tenant computational paradigm that offers an efficient, elastic and scalable business model for organizations to adopt various information technology (IT) resources i.e. software, hardware, network, storage, bandwidth etc. There are various aspects of security problem in cloud computing field which include data security, privacy and users’ authenticity. The purpose of this research paper is to construct a framework for secure and more advanced authentication scheme for executing secure transactions in a cloud environment. For any cloud service which deals with personal and private information exchange, single tier authentication is not adequate. Authentication schemes that imply more than one tier for authentication are comparatively safer than single tier authentication scheme. This work proposes a scheme in which authentication process is carried out in two levels or two tiers. First tier uses simple username and password on a standard cloud user’s interface. Second tier is use of any personal device like mobile which have a unique id and in possession of the authenticated user only. The advantage of this scheme is that it enhances the strength of authentication as if cloud server has to authenticate the standard user password and id as well as the associated device’s id and password simultaneously with each other.

Authors and Affiliations

Satish Kumar , Anita Ganpati

Keywords

Related Articles

Zone Based Feature Extraction and Statistical Classification Technique for Kannada Handwritten Numeral Recognition

This paper presents the zone based feature extraction and statistical classification technique for Kannada handwritten numeral recognition. The Kannada handwritten numeral database required for the experimentation is col...

Modern Steganographic technique: A survey

Steganography is one of the methods of secret communication that hides the existence of hidden message. It can be defined as the study of invisible communication that usually deals with the ways of hiding the existence o...

BLACK HOLE ATTACK AND ITS MITIGATION TECHNIQUES IN AODV AND OLSR

MANET is a self configurable, self deployable and infrastructure less network in which nodes are continuously moving and creates dynamic topology. For routing the main protocols using are AODV, OLSR, DSDV, DSR etc. AODV...

Improving the Network Lifetime of MANETs through CSP routing Algorithm

Cooperative Communication is a technique that allows multiple node to transmit the same data. In this paper propose a Cooperative Shortest Path (CSP) Routing Algorithm for Mobile ad hoc Network (MANETs).Cooperative Short...

Malicious Code Detection through Data Mining Techniques

Nowadays computer systems and communication infrastructures are likely to be influenced by different types of attacks so there is need to put further efforts for improving the software trust. Therefore, there will be inc...

Download PDF file
  • EP ID EP157758
  • DOI -
  • Views 129
  • Downloads 0

How To Cite

Satish Kumar, Anita Ganpati (2014). Multi-Authentication for Cloud Security: A Framework. International Journal of Computer Science & Engineering Technology, 5(4), 295-303. https://europub.co.uk./articles/-A-157758