Multi-Authentication for Cloud Security: A Framework
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 4
Abstract
Cloud computing is a multi-tenant computational paradigm that offers an efficient, elastic and scalable business model for organizations to adopt various information technology (IT) resources i.e. software, hardware, network, storage, bandwidth etc. There are various aspects of security problem in cloud computing field which include data security, privacy and users’ authenticity. The purpose of this research paper is to construct a framework for secure and more advanced authentication scheme for executing secure transactions in a cloud environment. For any cloud service which deals with personal and private information exchange, single tier authentication is not adequate. Authentication schemes that imply more than one tier for authentication are comparatively safer than single tier authentication scheme. This work proposes a scheme in which authentication process is carried out in two levels or two tiers. First tier uses simple username and password on a standard cloud user’s interface. Second tier is use of any personal device like mobile which have a unique id and in possession of the authenticated user only. The advantage of this scheme is that it enhances the strength of authentication as if cloud server has to authenticate the standard user password and id as well as the associated device’s id and password simultaneously with each other.
Authors and Affiliations
Satish Kumar , Anita Ganpati
Zone Based Feature Extraction and Statistical Classification Technique for Kannada Handwritten Numeral Recognition
This paper presents the zone based feature extraction and statistical classification technique for Kannada handwritten numeral recognition. The Kannada handwritten numeral database required for the experimentation is col...
Modern Steganographic technique: A survey
Steganography is one of the methods of secret communication that hides the existence of hidden message. It can be defined as the study of invisible communication that usually deals with the ways of hiding the existence o...
BLACK HOLE ATTACK AND ITS MITIGATION TECHNIQUES IN AODV AND OLSR
MANET is a self configurable, self deployable and infrastructure less network in which nodes are continuously moving and creates dynamic topology. For routing the main protocols using are AODV, OLSR, DSDV, DSR etc. AODV...
Improving the Network Lifetime of MANETs through CSP routing Algorithm
Cooperative Communication is a technique that allows multiple node to transmit the same data. In this paper propose a Cooperative Shortest Path (CSP) Routing Algorithm for Mobile ad hoc Network (MANETs).Cooperative Short...
Malicious Code Detection through Data Mining Techniques
Nowadays computer systems and communication infrastructures are likely to be influenced by different types of attacks so there is need to put further efforts for improving the software trust. Therefore, there will be inc...