Open Access   Article Go Back

Multi-Factor Authentication

S. Mayur1 , M. Harish2 , R. Tejesh3 , Vishal Umrao4 , ShaliniTiwari 5

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-14 , Page no. 509-511, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7si14.509511

Online published on May 15, 2019

Copyright © S. Mayur, M. Harish, R. Tejesh, Vishal Umrao, ShaliniTiwari . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S. Mayur, M. Harish, R. Tejesh, Vishal Umrao, ShaliniTiwari, “Multi-Factor Authentication,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.14, pp.509-511, 2019.

MLA Style Citation: S. Mayur, M. Harish, R. Tejesh, Vishal Umrao, ShaliniTiwari "Multi-Factor Authentication." International Journal of Computer Sciences and Engineering 07.14 (2019): 509-511.

APA Style Citation: S. Mayur, M. Harish, R. Tejesh, Vishal Umrao, ShaliniTiwari, (2019). Multi-Factor Authentication. International Journal of Computer Sciences and Engineering, 07(14), 509-511.

BibTex Style Citation:
@article{Mayur_2019,
author = {S. Mayur, M. Harish, R. Tejesh, Vishal Umrao, ShaliniTiwari},
title = {Multi-Factor Authentication},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {07},
Issue = {14},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {509-511},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1187},
doi = {https://doi.org/10.26438/ijcse/v7i14.509511}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i14.509511}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1187
TI - Multi-Factor Authentication
T2 - International Journal of Computer Sciences and Engineering
AU - S. Mayur, M. Harish, R. Tejesh, Vishal Umrao, ShaliniTiwari
PY - 2019
DA - 2019/05/15
PB - IJCSE, Indore, INDIA
SP - 509-511
IS - 14
VL - 07
SN - 2347-2693
ER -

           

Abstract

In this paper, we introduce a multi-factor authentication forverification (2FA) get to control framework for online distributed computing administrations. In particular, in our proposed 2FA access control framework, a characteristic based access control component is actualized with the need of both a client mystery key and a lightweight security gadget. As a client can`t get to the framework on the off chance that they don`t hold both, the component can improve the security of the framework, particularly in those situations where numerous clients share a similar PC for electronic cloud administrations. Likewise, trait based control in the framework additionally empowers the cloud server to limit the entrance to those clients with a similar arrangement of qualities while safeguarding client protection, i.e., the cloud server just realizes that the client satisfies the required predicate, however has no clue on the accurate personality of the client.

Key-Words / Index Term

Cipher text, Encryption, Distributed storage structures, Security, Cloud computing, Access Control, SEM

References

[1] M. H. Au and A. Kapadia. PERM: practical reputation-based blacklisting without TTPS. In T. Yu, G. Danezis, and V. D. Gligor, editors, the ACM Conference on Computer and Communications Security, CCS’12, Raleigh, NC, USA, October 16-18, 2012, pages 929– 940. ACM, 2012.
[2] M. H. Au, A. Kapadia, and W. Susilo. Blacr: Ttp-free blacklist able anonymous credentials with reputation. In NDSS. The Internet Society, 2012.
[3] M. H. Au, W. Susilo, and Y. Mu. Constant-Size Dynamic k-TAA. In SCN, volume 4116 of Lecture Notes in Computer Science, pages 111–125. Springer, 2006.
[4] J. Baek, Q. H. Vu, J. K. Liu, X. Huang, and Y. Xiang. A secure cloud computing based framework