Open Access   Article Go Back

Development of Security Model for Protecting Data in the Cloud Using 3-TIER Authentication

Agbakwuru 1 , A. Onyekachi.2 , Njoku 3 , D. Okechukwu4 , Amanze 5 , B. Chibuike6

Section:Research Paper, Product Type: Journal Paper
Volume-9 , Issue-6 , Page no. 37-44, Jun-2021

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v9i6.3744

Online published on Jun 30, 2021

Copyright © Agbakwuru, A. Onyekachi., Njoku, D. Okechukwu, Amanze, B. Chibuike . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Agbakwuru, A. Onyekachi., Njoku, D. Okechukwu, Amanze, B. Chibuike, “Development of Security Model for Protecting Data in the Cloud Using 3-TIER Authentication,” International Journal of Computer Sciences and Engineering, Vol.9, Issue.6, pp.37-44, 2021.

MLA Style Citation: Agbakwuru, A. Onyekachi., Njoku, D. Okechukwu, Amanze, B. Chibuike "Development of Security Model for Protecting Data in the Cloud Using 3-TIER Authentication." International Journal of Computer Sciences and Engineering 9.6 (2021): 37-44.

APA Style Citation: Agbakwuru, A. Onyekachi., Njoku, D. Okechukwu, Amanze, B. Chibuike, (2021). Development of Security Model for Protecting Data in the Cloud Using 3-TIER Authentication. International Journal of Computer Sciences and Engineering, 9(6), 37-44.

BibTex Style Citation:
@article{Onyekachi._2021,
author = {Agbakwuru, A. Onyekachi., Njoku, D. Okechukwu, Amanze, B. Chibuike},
title = {Development of Security Model for Protecting Data in the Cloud Using 3-TIER Authentication},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2021},
volume = {9},
Issue = {6},
month = {6},
year = {2021},
issn = {2347-2693},
pages = {37-44},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5345},
doi = {https://doi.org/10.26438/ijcse/v9i6.3744}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v9i6.3744}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5345
TI - Development of Security Model for Protecting Data in the Cloud Using 3-TIER Authentication
T2 - International Journal of Computer Sciences and Engineering
AU - Agbakwuru, A. Onyekachi., Njoku, D. Okechukwu, Amanze, B. Chibuike
PY - 2021
DA - 2021/06/30
PB - IJCSE, Indore, INDIA
SP - 37-44
IS - 6
VL - 9
SN - 2347-2693
ER -

VIEWS PDF XML
389 453 downloads 172 downloads
  
  
           

Abstract

This paper focuses on developing a security model for cloud computing to enhance the security for data stored in the database. Therefore this paper is providing a solution by designing a model for securing and protecting data in the cloud computing platform using National Identity Number (NIN), One Time Password (OTP) and Advanced Encryption Standard (AES). The design are simulated using a web-system developed with PHP, MySQL and JavaScript. The System Design followed the OOADM methodology for computerization of the system Modules giving room for coupling, decoupling, modification, encapsulation and reuse, as well as easy maintainability. Unified Modeling Language (UML) was extensively used to simplify the explanation of the system Modules. The software performance was tested using speed of data retrieval and security of the data protection. The security looks at the ability of the system to determine fraudulent users and deny them access to the system. The result obtained from the new system developed shows a high level of data security level as compare to existing system that uses only password for authentication.

Key-Words / Index Term

OTP, AES, NIN, UML, NETWORK

References

[1] Arnon, R., Peter, M., Maya, H. L., Jean, S., David, K., & Patti, R. (2020). Methodological review: Cloud computing: A new business paradigm for biomedical information sharing. J. of Biomedical Informatics, 43(2):342–353, April 2020. 8, 9, 12
[2] Agbasonu, V.C. (2017). Cloud computing security for data at rest and data on transit. International Journal of Scientific Research and Innovative Technology ISSN: 2313-3759 Vol. 4 No. 2; February 2017.
[3] Dan, L. & Anna, S. (2015). Data protection models for service provisioning in the cloud. In Proceedings of the 15th ACM symposium on Access control models and technologies, SACMAT’10, pages183–192, New York, NY, USA, 2015.ACM. 7, 12.
[4] Hamdi, M. (2017). Security of cloud computing, storage, and networking. In Collaboration Technologies and Systems (CTS), 2017. International Conference on, pages 1–5, May. 8
[5] Islam, M.R. & Habiba, M. (2015). Agent based framework for providing security to data storage in cloud. In Computer and Information Technology (ICCIT), 2015 15th International Conference on, pages 446–451, 2015. 13
[6] Iankoulova, I. & Daneva, M. (2018). Cloud computing security requirements: A systematic review. In Research Challenges in Information Science (RCIS), 2018 Sixth International Conference on, pages 1–7, May
[7] Jonathan, S. (2020) .An application architecture to facilitate multi-site clinical trial collaboration in the cloud. In Proceedings of the 2nd International Workshop on Software Engineering for Cloud Computing, SECLOUD ’11, pages 64–68, New York, NY, USA, 2020. ACM. 7.
[8] Kumar, A., Byung, G. L., HoonJae, L., and Kumari. A. (2016). Secure storage and access of data in cloud computing. In ICT Convergence (ICTC), 2016 International Conference on, pages 336–339, 2016. 13.
[9] Mohanaad, S. & Aaisha, K. (2019). Improving Authentication system for public cloud Computing.Publication at: https://www.researchgate.net/publication/331035798
[10] Munjpara, P. P. (2018). Implementation of Multi-tier Authentication Technique for Single-Sign On access of Cloud Services. Department of Computer Science and Engineering National Institute of Technology, Rourkela Rourkela-769 008, Odisha, India
[11] Muijnck-Hughes, J. (2019). Data Protection in the Cloud, 12 Jan, 2019 [Online], Available: http://www.ru.nl/ds
[12] Markus, J. & Faruque, A.S.M (2015). Mobile One Time Passwords and RC4 Encryption for Cloud Computing. School of Information Science, Computer and Electrical Engineering Halmstad University
[13] Niharika, G. & Rama, R.2015). Implementing High Grade Security in Cloud Application using Multifactor Authentication and Cryptography. International Journal of Web & Semantic Technology (IJWesT) Vol.6, No.2, April 2015
[14] Nayyar, M. A. (2016) Multi-Authority Authentication System for Cloud Data Storage. Computer Science and Engineering Department Indian Institute of Technology, Kharagpur Kharagpur - 721302
[15] Piliouras, T., Pui, L.Y., Yang, S., Siddaramaiah, N., Sultana, E., Meyer, V.K.A. and Harrington, R. (2011). Trust in a cloud-based healthcare environment. In Emerging Technologies for a Smarter World (CEWIT), 2011. 8th International Conference Expo on, pages 1–6
[16] Rui, Z. & Ling, L. (2019). Security models and requirements for healthcare application clouds.
[17] In Cloud Computing (CLOUD), 2019. IEEE 3rd International Conference on, pages 268–275, July. 7