A Novel information retrieval mechanism with secure authentication for third party applications in cloud based integration
G. Neelima1 , I. Ramesh Babu2
- Department of CSE, Acharya Nagarjuna University, Andhra Pradesh, India.
- Department of CSE, Acharya Nagarjuna University, Andhra Pradesh, India.
Section:Research Paper, Product Type: Journal Paper
Volume-6 ,
Issue-5 , Page no. 977-985, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.977985
Online published on May 31, 2018
Copyright © G. Neelima, I. Ramesh Babu . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: G. Neelima, I. Ramesh Babu, “A Novel information retrieval mechanism with secure authentication for third party applications in cloud based integration,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.977-985, 2018.
MLA Style Citation: G. Neelima, I. Ramesh Babu "A Novel information retrieval mechanism with secure authentication for third party applications in cloud based integration." International Journal of Computer Sciences and Engineering 6.5 (2018): 977-985.
APA Style Citation: G. Neelima, I. Ramesh Babu, (2018). A Novel information retrieval mechanism with secure authentication for third party applications in cloud based integration. International Journal of Computer Sciences and Engineering, 6(5), 977-985.
BibTex Style Citation:
@article{Neelima_2018,
author = {G. Neelima, I. Ramesh Babu},
title = {A Novel information retrieval mechanism with secure authentication for third party applications in cloud based integration},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2018},
volume = {6},
Issue = {5},
month = {5},
year = {2018},
issn = {2347-2693},
pages = {977-985},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2096},
doi = {https://doi.org/10.26438/ijcse/v6i5.977985}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i5.977985}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2096
TI - A Novel information retrieval mechanism with secure authentication for third party applications in cloud based integration
T2 - International Journal of Computer Sciences and Engineering
AU - G. Neelima, I. Ramesh Babu
PY - 2018
DA - 2018/05/31
PB - IJCSE, Indore, INDIA
SP - 977-985
IS - 5
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
520 | 299 downloads | 252 downloads |
Abstract
Cloud computing is a potential and assuring IT technique which helps the users to provide shared computing resources on demand. In recent days the companies are depending up on cloud resources for storage and processing of data. As the control of company’s data is handed to the third party the primary factors under utmost concern at the time of information retrieval are security and authentication. Authentication is essential in integration flows between applications for a suite of cloud services enabling users to deploy integrations with security. In my research paper we have used token based OAuth mechanism to provide authentication and query based framework for information retrieval. OAuth is a very secured authentication mechanism that is used to access the data from the source system. Secure retrieval mechanism is used for pulling the data from the cloud. The authentication technique used in our research paper is enhanced by using handshaking process with the source system and token generation in encrypted format. Analysis and implementation of this mechanism in the demo system illustrates its level of security.
Key-Words / Index Term
Cloud Integrations, OAuth Mechanism, OData Framework
References
Johannes K. Chiang, Eric H.W. Yen, Yen-Hua Chun, Authentication, Authorization and File Synchronization on Hybrid Cloud on Case of Google Docs, Hadoop, And Linux Local Hosts, IEEE DOI 10.1109/ISBAST,2013
[2]. Ja-Hwa Liu, Shi-Kai Huang: “A Research into Protection Mechanism for Cloud Information Security”, Proc. of the 2010 Conference on Computer Vision, Image Processing and Information, Zhongli Taiwan, Jun. 9, 2010
[3]. Liang-Jie Zhang, Quan Zhou, “CCOA: Cloud Computing Open Architecture,” IEEE DOI 10.1109/ICWS, 2009.
[4]. Harry Katzian Jr, “On the Privacy of Cloud Computing”, International Journal of Management and Information Systems. Littleton: Second Quarter 2010. Vol. 14, Iss. 2; p. 1
[5]. Bhaskar Prasad Rimal, Eunmi Choi, Ian Lumb, "A Taxonomy and Survey of Cloud Computing Systems”, ncm, pp.44-51, 2009 Fifth International Joint Conference on INC, IMS and IDC, 2009
[6]. W Michael Ryan, Christopher M Loeffler, “Insights into Cloud Computing” Intellectual Property & Technology Law Journal. Clifton: Nov 2010. Vol. 22, Iss. 11; p. 22
[7]. Qingqing Xie, Liangmin Wang and Hong Zhong “Non-Repudiable Query Answer Authentication Scheme over Anonymous Cloud Data”, 2016 International Conference on Advanced Cloud and Big Data, IEEE DOI 10.1109