Open Access   Article Go Back

Privacy Secure Data Authentication in Cloud Computing

Rakesh Prasad Sarang1 , Anshu Chaturvedi2 , D.N. Goswami3

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-9 , Page no. 723-731, Sep-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i9.723731

Online published on Sep 30, 2018

Copyright © Rakesh Prasad Sarang, Anshu Chaturvedi, D.N. Goswami . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Rakesh Prasad Sarang, Anshu Chaturvedi, D.N. Goswami, “Privacy Secure Data Authentication in Cloud Computing,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.723-731, 2018.

MLA Style Citation: Rakesh Prasad Sarang, Anshu Chaturvedi, D.N. Goswami "Privacy Secure Data Authentication in Cloud Computing." International Journal of Computer Sciences and Engineering 6.9 (2018): 723-731.

APA Style Citation: Rakesh Prasad Sarang, Anshu Chaturvedi, D.N. Goswami, (2018). Privacy Secure Data Authentication in Cloud Computing. International Journal of Computer Sciences and Engineering, 6(9), 723-731.

BibTex Style Citation:
@article{Sarang_2018,
author = {Rakesh Prasad Sarang, Anshu Chaturvedi, D.N. Goswami},
title = {Privacy Secure Data Authentication in Cloud Computing},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2018},
volume = {6},
Issue = {9},
month = {9},
year = {2018},
issn = {2347-2693},
pages = {723-731},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2934},
doi = {https://doi.org/10.26438/ijcse/v6i9.723731}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i9.723731}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2934
TI - Privacy Secure Data Authentication in Cloud Computing
T2 - International Journal of Computer Sciences and Engineering
AU - Rakesh Prasad Sarang, Anshu Chaturvedi, D.N. Goswami
PY - 2018
DA - 2018/09/30
PB - IJCSE, Indore, INDIA
SP - 723-731
IS - 9
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
701 338 downloads 224 downloads
  
  
           

Abstract

Cloud computing is a new modern and broad concept of the world. Users store huge amount of data on cloud storage for future use. Now a day’s privacy to the data stored in cloud is an aspect and security is a very major challenging mission in cloud computing. These challenges have huge effect in the development of secure data storage qualities of cloud system. The objective of this paper is to provide the privacy two factor authentication (2FA) techniques algorithm for the cloud environment with an attempt to bring solutions of such problems. The main aim of this paper is to design and propose Two-Factor Authentication (2FA) technology with One-Time Password (OTP) and finger print for providing strong security system to the data stored in cloud system. This paper, presents two modules, the first module deals with ensuring the storing security of data in encrypted format by using the (2FA) technique and the second module with digital signature algorithm (DSA). We have proposed framework which provides, verifies user authenticity using two-step verification, which is based on password, CSP level key establishment between the users and the cloud server.

Key-Words / Index Term

Cloud Computing, 2FA Secure Data Storage Cloud Server, DSA, Encryption and Decryption Algorithm Cloud Storage

References

[1] M.S. Monisha, S. Chidambaram,“Enhanced Data Security using RSA Digital Signature with Robust Reversible Watermarking Algorithm in Cloud Environment”, International Journal of Electronics & Co mmunication Technology, Vol.8, Issue 1, pp.20-24, 2017.
[2] M. Singhal, S. Tapaswi,“Software Tokens Based Two Factor Authentication Scheme”,International Journal of Information and Electronics Engineering, Vol.2, No. 3,pp.383-386, 2012.
[3] N. Mashhadi,“Authentication in mobile cloud computing by combining the tow factor Authentication and one time password token”,Vol.37, Part 2 pp. 220−229, 2015.
[4] Y. Kale, A. B. Patankar, “Enhanced Data Security Mechanism on Cloud using two-factor authentication, data encryption and key Sharing Mechanism”, Proceedings of 11th IRF International Conference, ISBN: 978-93-84209-27-8, pp.158- 161, 2014.
[5] A.Padmapriya, P.Subhasri, “Cloud Computing: Reverse Caesar Cipher Algorithm to Increase Data Security”, International Journal of Engineering Trends and Technology, Vol.4 Issue4, pp.1067- 1071, 2013.
[6] L. Arockiam, S. Monikandan,“Data Security and Privacy in Cloud Storage using Hybrid Symmetric Encryption Algorithm”, International Journal of Advanced Research in Computer and Communication Engineering, Vol.2, Issue 8, pp. 3064-3070, 2013.
[7] T. Sivasakthi, N. Prabakaran, “Applying Digital Signature with Encryption Algorithm of User Authentication for Data Security in Cloud Computing”, International Journal of Innovative Research in Computer and Communication Engineering,Vol. 2, Issue 2, pp. 3102- 3107,2014.
[8] M. A. Acha, M. J. Po, “Two (2)-Factor Authentication for Cloud Storage”, researchGate,2016.
[9] G. Saini, N. Sharma, “Triple Security of Data in Cloud Computing” ,International Journal of Computer Science and Information Technologies, Vol.5 Issue 4, pp. 5825-5827, 2014.
[10] A. Chaturvedi, D. N. Goswami, R. P. Sarang, “Privacy Algorithms to Improve the Secure Framework for Cloud Computing Environment”,
International Journal of Advanced Research in Computer and Communication Engineering, Vol.6, Issue 4,pp.63-69, 2017.
[11] D. Patil, P.K.Deshmukh, “Data Security in Cloud Using Attribute Based Encryption with Efficient Keyword Search”, International Journal of Scientific & Engineering Research, Vol.7, Issue 1, pp. 986-991, 2016.
[12] N. Nagar, U. Suman, “A Secure Mobile Cloud Storage Environment using Encryption Algorithm”, International Journal of Computer Applications, Vol.140, No.8, pp.33-43, 2016.
[13] A. Khodwe, V.R.Wadhankar, “Security Enhancement for Privacy Preservation in Cloud Computing by Anonymous Request Access”, International Journal on Recent and Innovation Trends in Computing and Communication, Vol.4, Issue 1, pp. 233-237, 2016.
[14] An Braeken, A. Touhafi, “ Efficient Anonymous User Authentication on Server Without Secure Channel During Registration”, IEEE, 978-1-4673-8894-8, 2016.
[15] R. Sugumar, K. A. M. Joycee, “DSCESEA: Data Security in Cloud using Enhanced Symmetric Encryption Algorithm”, International Journal of Engineering Research & Technology, Vol.6, Issue 10, pp. 292-295, 2017.