Combining Two Factor Authentication and Public Key Encryption to Ensure the Authentication in Cloud Computing
|
|
- Amberly Hardy
- 5 years ago
- Views:
Transcription
1 Combining Two Factor Authentication and Public Key Encryption to Ensure the Authentication in Cloud Computing Rajesham Gajula *1 Dr. Ahmed Abdul Moiz Qyser *2 N. Rajender *3 *1 Assistant Professor, Department of CSE, *2 Professor and Head of the Department *12 MuffakhamJah College of Engineering and Technology, Hyderabad, Telangana, India. *3 Associate Professor, Nalla Narashima Reddy Education Societye s Group of Institutions. Abstract There is huge data explosion from diverse of data sources and this huge amount of data is stored in cloud environment. There are so many security threats for sensitive data which is stored on cloud environment. Even though there are some security measures are applied to counter the threats still the security problems are warning and worrying the cloud users. Authentication checking plays a major role in securing the data from unauthorized user s access. Here we have given a proposal to improve the security by using Combining Two Factor Authentication and Public Key Encryption to Secure the Data in Cloud Computing. Two factor authentication and public key encryption are bladed in view of increasing the security. Keywords Cloud Computing, Authentication, Factor of Authentication, Public Key Encryption. I. INTRODUCTION Cloud Computing became a buzzword in information technology world. Many software industries are coming forward with cloud computing services like Microsoft, Google and Amazon. Data is exploding from wide variety of sources as we are entered into the arena of Cloud Computing. There may be sensitive data which is to be stored on cloud hence there is robust and strong technique is in demand to secure the data. One of the standard definition National Institute of Standard and Technology (NIST) [1] defined cloud computing as a model for enabling convenient, on demand network access to a shared pool of configurable computing resources (e.g., Network, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Cloud computing is typically classified in two ways: 1) Location of the cloud computing 2) Type of services offered Based on the Location of the cloud, Cloud computing is typically classified in the following three ways: Public cloud: In Public cloud the computing infrastructure is hosted by the cloud vendor at the vendor s premises. The customer has no visibility and control over where the computing infrastructure is hosted. The computing infrastructure is shared between many different organizations. Private cloud: The computing infrastructure is dedicated to a particular organization and not shared with other organizations. Private clouds are more expensive and more secure when compared to public clouds. Private clouds are of two types: On-premise private clouds and externally hosted private clouds. Externally hosted private clouds are also exclusively used by one organization, but are hosted by a third party specializing in cloud infrastructure. Externally hosted private clouds are cheaper than On-premise private clouds. Hybrid cloud: Organizations may host critical applications on private clouds and applications with relatively less security concerns on the public cloud. The usage of both private and public clouds together is called hybrid cloud. A related term is Cloud Bursting. In Cloud bursting organization use their own computing infrastructure for normal usage, but access the cloud using services like Salesforce s cloud computing for peak load requirements. This ensures that a sudden increase in computing requirement is handled efficiently. Community cloud: Involves sharing of computing infrastructure in between organizations of the same community. For example all Government organizations within India may share computing infrastructure on the cloud to manage data related to citizens residing in India. Based upon the services offered, clouds are classified in the following All Rights Reserved 118
2 Infrastructure as a service (IaaS) involves offering hardware related services using the principles of cloud computing. These could include some kind of storage services (database or disk storage). Famous vendors those offering Infrastructure as a service are Amazon EC2, AmazonS3, Rackspace Cloud Servers and Flexiscale [2]. Platform as a Service (PaaS) involves offering a development platform on the cloud. Platforms provided by different vendors are not compatible. Some vendors of PaaS are Google s Application Engine, Microsoft s Azure, Salesforce.com s force.com, etc[2]. Software as a service (SaaS) includes a complete software offering on the cloud. Users can access a software application hosted by the cloud vendor on pay-per-use basis. This is a well-established sector. The pioneer in this field has been Salesforce.com s offering in the online Customer Relationship Management (CRM) space. Other examples are online providers like Google s gmail and Microsoft s hotmail, Google docs and Microsoft s online version of office called BPOS (Business Productivity Online Standard Suite)[2]. There are different issues in cloud computing like reliability, availability of services and data, security, complexity, costs, regulations and legal issues, performance, migration, issues of privacy etc. In this paper we are proposing a different and efficient approach of authentication. II. LITERATURE SURVEY Data is more crucial resource in information space. We have to give priority to secure the data by using various techniques to fulfill the availability characteristic of data. Authentication checking is vital in pursuit of data security in any environment. Authentication can be defined as a process by which a system validates the identity of a User who wishes to access it. In remote authentication there are three factors of authentication are present those are 1) Something the client knows 2) Something the client has 3) Something the Client is In something the client knows [3] comes under the One Factor Authentication. In this authentication generally passwords are used check the authentication. This authentication is not strong because the passwords can be cracked easily. Something the Client has [2] is Two Factor Authentication. In this authentication the client authentication provide by the smart card, Wireless RFID based tokens, USB tokens and Audio Port tokens, one time passwords. The third type of authentication is three factor authentications using something the user is. This authentication is achieved by biometric authentication like finger print scan, voice scan and iris scan. This three factor authentication improves the security more than the remaining two types of authentication schemes. Different authentication mechanisms are discussed in Multi factor Authentication in Cloud Computing for Data Storage Security [4]. In Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing, proposed a shared authority based privacy-preserving authentication protocol (SAPA) to address privacy issue for cloud storage [5]. An Efficient Protocol with Bidirectional Verification for Storage Security in Cloud Computing in this first they design an auditing framework for cloud storage systems and propose an efficient and privacy-preserving auditing protocol. Then, they extended auditing protocol to support dynamic data operations, which is efficient and has been proven to be secure in the random oracle model. Further they extended auditing protocol to support bidirectional authentication and statistical analysis [6]. Feasibility of implementation of various types of multi-factor authentication protocols are discussed in Feasibility of Implementing Multi-factor Authentication Schemes in Mobile Cloud Computing [7]. In this paper the security and privacy of these algorithms are analyzed and some future directions are also recommended. In Membership proof and verification in authenticated skip lists based on heap an authenticated skip list is used for authentication verification. Authenticated skip list is designed using two stacks in which one stack is for storing traversal chain and another one for storing authentication path [8]. In Authentication in the Clouds: A Framework and its Application to Mobile Users, the authors proposed a framework for authentication to mobile user where there are limited resources like processor and power All Rights Reserved 119
3 Different ciphers are used to provide security to data. Cipher is combination of Encryption and Decryption algorithms. There basically two types of ciphers based on key used. One is Symmetric Key Encryption. The Second one is Asymmetric Key Encryption which is known as Public Key Encryption. The meaning of the word Symmetric is same or identical. In symmetric Key encryption same keys are used for encryption and decryption. Block ciphers like DES (Data Encryption Standard), AES (Advanced Encryption Standard) and IDEA (International Data Encryption Algorithm) are comes under the category of Symmetric Encryption. The Symmetric Key Encryption requires more computational power and time as more complex operations are performed iteratively. Further there should be a trusted third party to carry out the key exchange operation between the end user/clients. In Asymmetric Key Encryption different keys are use at encryption site and decryption site. One Key is used for encryption and another key used for decryption and it is not possible to get the encryption key with the help of decryption key. The examples of Asymmetric Key Encryption algorithms are RSA, ElGamal and Elliptical Curve Cryptography. III. PROPOSED SYSTEM In this paper we are proposing a different authentication scheme to provide security to data in cloud computing by combining the Two Factor Authentication and Public Key Encryption. Authentication checking is done in two phases in the proposed system. In first phase two factor authentication [9] is used and in second phase public encryption is used. In two factor authentication password and one more token which is a pseudorandom number is used for checking authentication. In second phase any public key encryption is use like RSA [10], ElGamal Cryptosystem [11] or Elliptic Curve Cryptography (ECC) [12]. Every public key cryptosystem exhibits advantages and disadvantages. We are proposing Two Factor Authentication to improve security and public key encryption as the public key encryption is strong, consumes less computation power and in which Key distribution is not required. Two Factor Authentications: User login remote system with the User Id and Password. Upon receiving the user id and password the cloud server check for authentication if the given User Id and Passwords are valid then for two factor authentication purpose the cloud server sends an encrypted pseudorandom number to client by using the public key. The client has to decrypt the pseudorandom number which is sent by the cloud server with its key. After the decryption then the client re-encrypt the pseudorandom number with the public key and send back to the cloud server. Clouds Sever will check compare the sent pseudorandom number and receive pseudorandom number. If those are same then it allows accessing the data or it rejects the client for further access of the data. The schematic diagram of the proposed system is given in Fig1 The Notations of Fig 1: UId, PW => User Id and Password (PN)PK => PN is Pseudorandom Number and PK is Public Key. (PN)PK means Pseudorandom Number encrypted using public Key Our proposed system Combining Two Factor Authentication and Public Key Encryption to Secure the Data in Cloud Computing is depicted in the fig2 and the process is as follows Step1: Client Login with login credentials Setp2: Cloud Server validates the password. If the password is valid then it proceeds to next step3 else cloud rejects that the client as unauthenticated client. Step3: Cloud Server Generates a pseudorandom number and it encrypt that with public key. Step 4: The encrypted pseudorandom number will be sent to client. Step5: Client receives the encrypted pseudorandom number and decrypts with its private key. Step6: The Client sends the pseudorandom number by encrypting with public key. Step7: The Cloud Server decrypts the encrypted pseudorandom number. Step8: If the generated pseudorandom number and received pseudorandom number is same All Rights Reserved 120
4 client will be treated as authentic otherwise it will be treated as unauthentic. gradation of this system by using multi factor authentication for real time cloud communication. REFERENCES IV. CONCLUSIONS This system provides more security as we are using two factor authentication and public key encryption combination for authentication purpose. Though it is more secure there is still scope for up [1] P. Mell and T. Grance, The NIST Definition of Cloud Computing, September [2] Taxonomy of cloud computing services C.N. Hoefer and G. Karagiannis [3] A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems, Xinyi Huang, Yang Xiang, Ashley Chonka, Jianying Zhou, and Robert H. Deng, IEEE Transactions On Parallel And Distributed Systems, Vol. 22, NO. 8, August 2011 [4] Multi factor Authentication in Cloud Computing for Data Storage Security, by Deepa Panse, P. Haritha, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 8 August 2014 [5] Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing, in Cloud Computing Hong Liu, Student Member, IEEE, Huansheng Ning, Senior Member, IEEE, Qingxu Xiong, Member, IEEE, and Laurence T. Yang, Member, IEEE, in IEEE Transactions On Parallel And Distributed Systems, Vol. 26, NO. 1, January 2015 [6] An Efficient Protocol With Bidirectional Verification for Storage Security in Cloud Computing, Bin Feng, Xinzhu Ma, Cheng Guo, Hui Shi, Zhangjie Fu, (Member, IEEE) and Tie Qiu (Senior Member, IEEE) [7] Feasibility of Implementing Multi-factor Authentication Schemes in Mobile Cloud Computing Mojtaba Alizadeh, Wan Haslina Hassan, Touraj Khodadadi in 2014 Fifth International Conference on Intelligent Systems, Modeling and Simulation [8] Membership Proof and Verification in Authenticated Skip Lists Based on Heap by Shuanghe Peng, Zhige Chen, Deen Chen [9] Authentication in the Clouds: A Framework and its Application to Mobile Users, Richard Chow, Markus Jakobsson and Ryusuke Masuoka [10] Using Two - factor Authentication Systems to Prevent Social Phishing & Man in the Browser Attacks for Internet Banking, Zhe SUN (Zsun012) [11] The RSA Algorithm Evgeny Milanov 3 June 2009 [12] The ElGamal Cryptosystem Andreas V. Meier June 8, 2005 [13] I. Blake, G. Seroussi, and N. Smart: Elliptic Curves in Cryptography. Cambridge, U.K.: Cambridge University Press, 1999, Vol All Rights Reserved 121
5
Introduction To Cloud Computing
Introduction To Cloud Computing What is Cloud Computing? Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g.,
More informationImplementation of Decentralized Access Control with Anonymous Authentication in Cloud
Volume-5, Issue-6, December-2015 International Journal of Engineering and Management Research Page Number: 210-214 Implementation of Decentralized Access Control with Anonymous Authentication in Cloud
More informationAES and DES Using Secure and Dynamic Data Storage in Cloud
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
More informationAn efficient and practical solution to secure password-authenticated scheme using smart card
An efficient and practical solution to secure password-authenticated scheme using smart card R. Deepa 1, R. Prabhu M.Tech 2, PG Research scholor 1, Head of the Department 2 Dept.of Information Technology,
More informationDATA INTEGRITY TECHNIQUES IN CLOUD: AN ANALYSIS
DATA INTEGRITY TECHNIQUES IN CLOUD: AN ANALYSIS 1 MS. R. K. PANDYA, 2 PROF. K. K. SUTARIA 1 M.E.[Cloud Computing] Student, Computer Engineering Department, V. V. P. Engineering College, Rajkot, Gujarat
More informationMulti Packed Security Addressing Challenges in Cloud Computing
Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 1 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationA Two-Fold Authentication Mechanism for Network Security
Asian Journal of Engineering and Applied Technology ISSN 2249-068X Vol. 7 No. 2, 2018, pp. 86-90 The Research Publication, www.trp.org.in A Two-Fold for Network Security D. Selvamani 1 and V Selvi 2 1
More information1/10/2011. Topics. What is the Cloud? Cloud Computing
Cloud Computing Topics 1. What is the Cloud? 2. What is Cloud Computing? 3. Cloud Service Architectures 4. History of Cloud Computing 5. Advantages of Cloud Computing 6. Disadvantages of Cloud Computing
More informationMitigating Risks with Cloud Computing Dan Reis
Mitigating Risks with Cloud Computing Dan Reis Director of U.S. Product Marketing Trend Micro Agenda Cloud Adoption Key Characteristics The Cloud Landscape and its Security Challenges The SecureCloud Solution
More informationTo Enhance Homomorphic Encryption scheme for Key Management and Key Sharing in Cloud Computing
International Journal of Emerging Trends in Science and Technology To Enhance Homomorphic Encryption scheme for Key Management and Key Sharing in Cloud Computing Author Preeti Ahuja Punjabi University
More informationEllie Bushhousen, Health Science Center Libraries, University of Florida, Gainesville, Florida
Cloud Computing Ellie Bushhousen, Health Science Center Libraries, University of Florida, Gainesville, Florida In the virtual services era the term cloud computing has worked its way into the lexicon.
More informationPrivate cloud to support Infrastructure þÿ a s a S e r v i c e I a a S
Daffodil International University Institutional Repository Textile Engineering Project Report of B.Sc 2017-03-01 Private cloud to support Infrastructure þÿ a s a S e r v i c e I a a S Islam, Zahirul Daffodil
More informationEnhanced Novel Multilevel Secure User Authentication Scheme in Cloud.
Enhanced Novel Multilevel Secure User Authentication Scheme in Cloud. A.Lakshmi Pavani 1, K.Devi Priya 2 1 M. Tech Student, Department of Computer Science and Engineering, Aditya Engineering College, Surampalem,
More informationIntroduction to Cloud Computing. [thoughtsoncloud.com] 1
Introduction to Cloud Computing [thoughtsoncloud.com] 1 Outline What is Cloud Computing? Characteristics of the Cloud Computing model Evolution of Cloud Computing Cloud Computing Architecture Cloud Services:
More informationCHEM-E Process Automation and Information Systems: Applications
CHEM-E7205 - Process Automation and Information Systems: Applications Cloud computing Jukka Kortela Contents What is Cloud Computing? Overview of Cloud Computing Comparison of Cloud Deployment Models Comparison
More informationIJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 5, Oct-Nov, 2013 ISSN:
SIMHA : Secure Biometric Multi-Host Authentication Ramya K P 1, Chithra Devi R 2 and Revathi M K 3 1 Information Technology, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, Tamil Nadu 628215,
More informationProgramowanie w chmurze na platformie Java EE Wykład 1 - dr inż. Piotr Zając
Programowanie w chmurze na platformie Java EE Wykład 1 - dr inż. Piotr Zając Cloud computing definition Cloud computing is a model for enabling ubiquitous, convenient, ondemand network access to a shared
More informationA Survey on Cryptography Based QR code authentication
A Survey on Cryptography Based QR code authentication Ronak M. Parmar 1, Krunal J. Panchal 2 1 Student, Computer Engineering Department, L.J. Institute of Engineering & Technology, Gujarat, India 2 Assistant
More informationLarge Scale Computing Infrastructures
GC3: Grid Computing Competence Center Large Scale Computing Infrastructures Lecture 2: Cloud technologies Sergio Maffioletti GC3: Grid Computing Competence Center, University
More informationA compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems.
A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems. G Swetha M.Tech Student Dr.N.Chandra Sekhar Reddy Professor & HoD U V N Rajesh Assistant Professor Abstract Cryptography
More informationVolume 8, No. 3, March April 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at
Volume 8, No. 3, March April 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at www.ijarcs.info ISSN No. 0976-5697 Design of Architecture for Efficient
More informationPRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS. SRM University, Kattankulathur, Chennai, IN.
Volume 115 No. 6 2017, 585-589 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu PRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS
More informationISSN Vol.08,Issue.16, October-2016, Pages:
ISSN 2348 2370 Vol.08,Issue.16, October-2016, Pages:3146-3152 www.ijatir.org Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation VEDIRE AJAYANI 1, K. TULASI 2, DR P. SUNITHA
More informationCloud Computing and Service-Oriented Architectures
Material and some slide content from: - Atif Kahn SERVICES COMPONENTS OBJECTS MODULES Cloud Computing and Service-Oriented Architectures Reid Holmes Lecture 29 - Friday March 22 2013. Cloud precursors
More informationEmbracing a Secure Cloud. Cloud & Network Virtualisation India 2017
Embracing a Secure Cloud Cloud & Network Virtualisation India 2017 Cloud Computing Group of computing resources providing services such as servers, storage, databases, software, applications, networks
More informationAuditing the Cloud. Paul Engle CISA, CIA
Auditing the Cloud Paul Engle CISA, CIA About the Speaker Paul Engle CISA, CIA o Fifteen years performing internal audit, IT internal audit, and consulting projects o Internal audit clients include ADP,
More informationRijndael Encryption Technique for User Authentication in Cloud Computing
Rijndael Encryption Technique for User Authentication in Cloud Computing 1 Firkhan Ali Bin Hamid Ali and 2 Md Yazid Mohd Saman 1 Fakulti Teknologi Maklumat & Multimedia, Universiti Tun Hussein Onn Malaysia.
More informationMoving to computing are auditors ready for the security challenges? Albert Otete CPA CISA ISACA Uganda Workshop
Moving to computing are auditors ready for the security challenges? Albert Otete CPA CISA ISACA Uganda Workshop 10.08.2011 What is computing? Examples of service providers Computing preface Cloud computing
More informationABSTRACT I. INTRODUCTION
2018 IJSRSET Volume 4 Issue 4 Print ISSN: 2395-1990 Online ISSN : 2394-4099 Themed Section : Engineering and Technology An Efficient Search Method over an Encrypted Cloud Data Dipeeka Radke, Nikita Hatwar,
More informationWho s Protecting Your Keys? August 2018
Who s Protecting Your Keys? August 2018 Protecting the most vital data from the core to the cloud to the field Trusted, U.S. based source for cyber security solutions We develop, manufacture, sell and
More informationCloud security is an evolving sub-domain of computer and. Cloud platform utilizes third-party data centers model. An
Abstract Cloud security is an evolving sub-domain of computer and network security. Cloud platform utilizes third-party data centers model. An example of cloud platform as a service (PaaS) is Heroku. In
More informationSecurity in ECE Systems
Lecture 11 Information Security ECE 197SA Systems Appreciation Security in ECE Systems Information security Information can be very valuable Secure communication important to protect information Today
More informationISSN Vol.04,Issue.05, May-2016, Pages:
WWW.IJITECH.ORG ISSN 2321-8665 Vol.04,Issue.05, May-2016, Pages:0737-0741 Secure Cloud Storage using Decentralized Access Control with Anonymous Authentication C. S. KIRAN 1, C. SRINIVASA MURTHY 2 1 PG
More informationEFFICIENT RETRIEVAL OF DATA FROM CLOUD USING DATA PARTITIONING METHOD FOR BANKING APPLICATIONS [RBAC]
EFFICIENT RETRIEVAL OF DATA FROM CLOUD USING DATA PARTITIONING METHOD FOR BANKING APPLICATIONS [RBAC] Rajalakshmi V., Jothi Nisha V. and Dhanalakshmi S. Faculty of Computing, Sathyabama University, Chennai,
More informationMANAGED CLOUD SERVICES
JARGON BUSTERS MANAGED CLOUD SERVICES CLOUD SERVICES Any IT service that is accessed on demand via the internet rather than from your own computers and servers. PRIVATE CLOUD Services offered over the
More informationWhose Cloud Is It Anyway? Exploring Data Security, Ownership and Control
Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control SESSION ID: CDS-T11 Sheung-Chi NG Senior Security Consulting Manager, APAC SafeNet, Inc. Cloud and Virtualization Are Change the
More informationEfficient integrity checking technique for securing client data in cloud computing
International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 11 No: 05 43 Efficient integrity checking technique for securing client data in cloud computing Dalia Attas and Omar Batrafi Computer
More informationBest Practices in Securing Your Customer Data in Salesforce, Force.com & Chatter
White Paper Best Practices in Securing Your Customer Data in Salesforce, Force.com & Chatter Overcoming Security, Privacy & Compliance Concerns 333 W. San Carlos Street San Jose, CA 95110 Table of Contents
More informationSystem Approach for Single Keyword Search for Encrypted data files Guarantees in Public Infrastructure Clouds
System Approach for Single Keyword Search for Encrypted data files Guarantees in Public Infrastructure s B.Nandan 1, M.Haripriya 2, N.Tejaswi 3, N. Sai Kishore 4 Associate Professor, Department of CSE,
More informationDEEP DIVE INTO CLOUD COMPUTING
International Journal of Research in Engineering, Technology and Science, Volume VI, Special Issue, July 2016 www.ijrets.com, editor@ijrets.com, ISSN 2454-1915 DEEP DIVE INTO CLOUD COMPUTING Ranvir Gorai
More informationSecurity+ SY0-501 Study Guide Table of Contents
Security+ SY0-501 Study Guide Table of Contents Course Introduction Table of Contents About This Course About CompTIA Certifications Module 1 / Threats, Attacks, and Vulnerabilities Module 1 / Unit 1 Indicators
More informationSecure Encryption Using Armstrong Number,Color Code ASCII and Prime Number
Advances in Wireless and Mobile Communications. ISSN 0973-6972 Volume 10, Number 6 (2017), pp. 1257-1265 Research India Publications http://www.ripublication.com Secure Encryption Using Armstrong Number,Color
More informationINFS 214: Introduction to Computing
INFS 214: Introduction to Computing Session 13 Cloud Computing Lecturer: Dr. Ebenezer Ankrah, Dept. of Information Studies Contact Information: eankrah@ug.edu.gh College of Education School of Continuing
More informationEfficient Auditable Access Control Systems for Public Shared Cloud Storage
Efficient Auditable Access Control Systems for Public Shared Cloud Storage Vidya Patil 1, Prof. Varsha R. Dange 2 Student, Department of Computer Science Dhole Patil College of Engineering, Pune, Maharashtra,
More informationDuncanPowell RESTRUCTURING TURNAROUND FORENSIC
Forensic Technology and the Cloud DuncanPowell RESTRUCTURING TURNAROUND FORENSIC 12 October 2017 DucanPowell Forensic Team Peter Lanthois Partner Office: (08) 8223 8107 Mobile: 0407 258 959 Email: planthois@duncanpowell.com.au
More informationStudy on data encryption technology in network information security. Jianliang Meng, Tao Wu a
nd International Workshop on Materials Engineering and Computer Sciences (IWMECS 05) Study on data encryption technology in network information security Jianliang Meng, Tao Wu a School of North China Electric
More informationSurvey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
More informationCloud Computing Standard 1.1 INTRODUCTION 2.1 PURPOSE. Effective Date: July 28, 2015
Cloud Computing Standard Effective Date: July 28, 2015 1.1 INTRODUCTION Cloud computing services are application and infrastructure resources that users access via the Internet. These services, contractually
More informationWhy the cloud matters?
Why the cloud matters? Speed and Business Impact Expertise and Performance Cost Reduction Trend Micro Datacenter & Cloud Security Vision Enable enterprises to use private and public cloud computing with
More informationAnalysis of Attribute Set-Based Encryption Solution for Access Control in Cloud Computing
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 9, September 2013,
More informationKusum Lata, Sugandha Sharma
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 4 ISSN : 2456-3307 A Survey on Cloud Computing and Mobile Cloud Computing
More informationAnEffectiveAuthenticationSchemeforDistributedMobileCloudComputingServicesusingaSinglePrivateKey
Global Journal of Computer Science and Technology: B Cloud and Distributed Volume 16 Issue 2 Version 1.0 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc.
More informationENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING
ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING S KEERTHI 1*, MADHAVA REDDY A 2* 1. II.M.Tech, Dept of CSE, AM Reddy Memorial College of Engineering & Technology, Petlurivaripalem. 2. Assoc.
More informationDyadic Security Enterprise Key Management
Dyadic Security Enterprise Key Management The Secure-as-Hardware Software with a Mathematical Proof Dyadic Enterprise Key Management (EKM) is the first software-only key management and key protection system
More informationhidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION
HID ActivOne USER FRIENDLY STRONG AUTHENTICATION We understand IT security is one of the TOUGHEST business challenges today. HID Global is your trusted partner in the fight against data breach due to misused
More informationInternational Journal of Advance Engineering and Research Development
Scientific Journal of Impact Factor (SJIF): 5.71 e-issn (O): 2348-4470 p-issn (P): 2348-6406 International Journal of Advance Engineering and Research Development Volume 5, Issue 03, March -2018 A SURVEY
More informationCloud-Security: Show-Stopper or Enabling Technology?
Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics
More informationISSN: (Online) Volume 3, Issue 7, July 2015 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 3, Issue 7, July 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationAN ANALYSIS OF DEPLOYMENT MODELS IN CLOUD COMPUTING
BEST: International Journal of Management, Information Technology and Engineering (BEST: IJMITE) ISSN (P): 2348-0513, ISSN (E): 2454-471X, Vol. 4, Issue 3, Mar 2016, 89-98 BEST Journals AN ANALYSIS OF
More informationTracking Down Unauthorized Access by Users in Cloud
Tracking Down Unauthorized Access by Users in Cloud Swati Mehta #1, Jitender Saini #2 1,2Department of Computer Science 1,2N.C College of Engineering, Israna Haryana, India ---------------------------------------------------------------------***---------------------------------------------------------------------
More informationSECURED TRANSMISSION OF BIOMETRIC CONTENT USING VISUAL CRYPTOGRAPHY
Volume 119 No. 15 2018, 1557-1564 ISSN: 1314-3395 (on-line version) url: http://www.acadpubl.eu/hub/ http://www.acadpubl.eu/hub/ SECURED TRANSMISSION OF BIOMETRIC CONTENT USING VISUAL CRYPTOGRAPHY S. EsaiPuvanesh
More informationGoogle Identity Services for work
INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new
More informationAssociation of Cloud Computing in IOT
, pp.60-65 http://dx.doi.org/10.14257/astl.2017.147.08 Association of Cloud Computing in IOT K.Asish Vardhan 1, Eswar Patnala 2 and Rednam S S Jyothi 3 2,3 Assistant Professor, Dept. of Information Technology,
More informationA Modified Approach for Kerberos Authentication Protocol with Secret Image by using Visual Cryptography
A Modified Approach for Kerberos Authentication Protocol with Secret Image by using Visual Cryptography Ashok Kumar J 1, and Gopinath Ganapathy 2 1,2 School of Computer Science, Engineering and Applications
More informationInternational Journal of Computer Engineering and Applications, Volume XIII, Issue II, Feb. 19, ISSN STUDY ON CLOUD COMPUTING
Omkumar R. Badhai, Shreya A. Deo, Snehal B.Satpute, Mansi Agrawal Department of Computer Engineering, Sipna College Of engineering and Technology, Amravati, Sant Gadge Baba Amravati University ABSTRACT:
More informationLeveraging the Cloud for Law Enforcement. Richard A. Falkenrath, PhD Principal, The Chertoff Group
Leveraging the Cloud for Law Enforcement Richard A. Falkenrath, PhD Principal, The Chertoff Group Law Enforcement Information Management Training Conference & Technology Exposition May 21,2013 Outline
More informationCommunity Clouds And why you should care about them
Community Clouds And why you should care about them Matt Johnson, Ed Zedlewski, Eduserv Introduction What is Cloud Computing? National Institute of Standards & Technology (NIST) a model for enabling convenient,
More informationCloud Computing Technologies and Types
Cloud Computing Technologies and Types Jo, Heeseung From Dell Zhang's, Birkbeck, University of London The Technological Underpinnings of Cloud Computing Data centers Virtualization RESTful APIs Cloud storage
More informationForensic Analysis Approach Based on Metadata and Hash Values for Digital Objects in the Cloud
Forensic Analysis Approach Based on Metadata and Hash Values for Digital Objects in the Cloud Ezz El-Din Hemdan 1, Manjaiah D.H 2 Research Scholar, Department of Computer Science, Mangalore University,
More informationEMERGING TRENDS AROUND AUTHENTICATION
EMERGING TRENDS AROUND AUTHENTICATION Michelle Salway Senior Director Sales - EMEA May 2017 1 BIOMETRICS: A GIFT FROM THE DEVICE MAKERS & BIOMETRIC VENDORS DEVICES ARE RICH IN AUTHENTICATION CAPABILITIES,
More informationZero private information leak using multi-level security and privileged access for designated authorities on demand
Zero private information leak using multi-level security and privileged access for designated authorities on demand Syama BabuRaj 1, Pretty Babu 2 Dept.Computer Science & Engg., Sree Buddha College of
More informationSecurity+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography Objectives Define cryptography Describe hashing List the basic symmetric cryptographic algorithms 2 Objectives
More informationPreserving Privacy of Location Based Services
Preserving Privacy of Location Based Services Pooja Yedekar 1, Jyoti More 2, Swapnil Jujar 3, Gaurav Patil 4, Vaibhav Dange 5 1Pooja Yedekar U.G Student and Dr. Daulatrao Aher College Of Engineering, Karad.
More informationCryptanalysis of a Markov Chain Based User Authentication Scheme
Cryptanalysis of a Markov Chain Based User Authentication Scheme Ruhul Amin, G.P. Biswas Indian School of Mines, Dhanbad Department of Computer Science & Engineering Email: amin ruhul@live.com, gpbiswas@gmail.com
More informationCSC 474 Network Security. Authentication. Identification
Computer Science CSC 474 Network Security Topic 6. Authentication CSC 474 Dr. Peng Ning 1 Authentication Authentication is the process of reliably verifying certain information. Examples User authentication
More informationAttacking Your Two-Factor Authentication (PS: Use Two-Factor Authentication)
Attacking Your Two-Factor Authentication (PS: Use Two-Factor Authentication) 08 Jun 2017 K-LUG Technical Meeting Rochester, MN Presented by: Vi Grey Independent Security Researcher https://vigrey.com Who
More informationCS 6393 Lecture 10. Cloud Computing. Prof. Ravi Sandhu Executive Director and Endowed Chair. April 12,
CS 6393 Lecture 10 Cloud Computing Prof. Ravi Sandhu Executive Director and Endowed Chair April 12, 2013 ravi.sandhu@utsa.edu www.profsandhu.com Ravi Sandhu 1 The Cloud The Network is the Computer - Sun
More informationBest Practices in Securing a Multicloud World
Best Practices in Securing a Multicloud World Actions to take now to protect data, applications, and workloads We live in a multicloud world. A world where a multitude of offerings from Cloud Service Providers
More information1 The intersection of IAM and the cloud
1 The intersection of IAM and the cloud Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Theory, practice, pros and cons with a focus on enterprise deployments of IAM and cloud
More informationDyadic Enterprise. Unbound Key Control For Azure Marketplace. The Secure-As-Hardware Software With a Mathematical Proof
Dyadic Enterprise Unbound Key Control For Azure Marketplace The Secure-As-Hardware Software With a Mathematical Proof Unbound Key Control (UKC) is the first software-only key management and key protection
More informationInternational Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 4, Jul Aug 2017
RESEARCH ARTICLE OPEN ACCESS Optimizing Fully Homomorphic Encryption Algorithm using Greedy Approach in Cloud Computing Kirandeep Kaur [1], Jyotsna Sengupta [2] Department of Computer Science Punjabi University,
More informationParameter Sweeping Programming Model in Aneka on Data Mining Applications
Parameter Sweeping Programming Model in Aneka on Data Mining Applications P. Jhansi Rani 1, G. K. Srikanth 2, Puppala Priyanka 3 1,3 Department of CSE, AVN Inst. of Engg. & Tech., Hyderabad. 2 Associate
More informationSecuring V2X communications with Infineon HSM
Infineon Security Partner Network Securing V2X communications with Infineon HSM Savari and Infineon The Sign of Trust for V2X Products SLI 97 www.infineon.com/ispn Use case Application context and security
More informationProtecting your Data in the Cloud. Cyber Security Awareness Month Seminar Series
Protecting your Data in the Cloud Cyber Security Awareness Month Seminar Series October 24, 2012 Agenda Introduction What is the Cloud Types of Clouds Anatomy of a cloud Why we love the cloud Consumer
More informationECE Enterprise Storage Architecture. Fall ~* CLOUD *~. Tyler Bletsch Duke University
ECE590-03 Enterprise Storage Architecture Fall 2017.~* CLOUD *~. Tyler Bletsch Duke University Includes material adapted from the course Information Storage and Management v2 (module 13), published by
More informationMultitenant Software as a Service: Application Development Approach
Multitenant Software as a Service: Application Development Approach Suhas Gajakosh 1, Mukta Takalikar 2 Abstract Software as a Service (SaaS) is bringing new revolution to IT industry. SaaS has changed
More informationSyllabus: The syllabus is broadly structured as follows:
Syllabus: The syllabus is broadly structured as follows: SR. NO. TOPICS SUBTOPICS 1 Foundations of Network Security Principles of Network Security Network Security Terminologies Network Security and Data
More informationCryptanalysis on Four Two-Party Authentication Protocols
Cryptanalysis on Four Two-Party Authentication Protocols Yalin Chen Institute of Information Systems and Applications, NTHU, Tawain d949702@oz.nthu.edu.tw Jue-Sam Chou * Dept. of Information Management
More informationCopyright 2011 EMC Corporation. All rights reserved.
1 2 How risky is the Cloud? 3 Is Cloud worth it? YES! 4 Cloud adds the concept of Supply Chain 5 Cloud Computing Definition National Institute of Standards and Technology (NIST Special Publication 800-145
More informationCloud Computing, SaaS and Outsourcing
Cloud Computing, SaaS and Outsourcing Michelle Perez, AGC Privacy, IPG Bonnie Yeomans, VP, AGC & Privacy Officer, CA Technologies PLI TechLaw Institute 2017: The Digital Agenda Introduction to the Cloud
More informationAuthentication Technology for a Smart eid Infrastructure.
Authentication Technology for a Smart eid Infrastructure. www.aducid.com One app to access all public and private sector online services. One registration allows users to access all their online accounts
More informationRashmi P. Sarode et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (5), 2015,
SMS Encryption Rashmi P. Sarode *, Neeraj Manglani Department of Computer Science Jagan Nath University, Jaipur, India Abstract In the application of Computer Science, the performance of classification
More informationABSTRACT I. INTRODUCTION. Telangana, India 2 Professor, Department of Computer Science & Engineering, Shadan College of Engineering & Technology,
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 Secure Proxy Server Data Sharing Scheme in Hybrid
More informationCLOUD COMPUTING. Lecture 4: Introductory lecture for cloud computing. By: Latifa ALrashed. Networks and Communication Department
1 CLOUD COMPUTING Networks and Communication Department Lecture 4: Introductory lecture for cloud computing By: Latifa ALrashed Outline 2 Introduction to the cloud comupting Define the concept of cloud
More informationCPSC 426/526. Cloud Computing. Ennan Zhai. Computer Science Department Yale University
CPSC 426/526 Cloud Computing Ennan Zhai Computer Science Department Yale University Recall: Lec-7 In the lec-7, I talked about: - P2P vs Enterprise control - Firewall - NATs - Software defined network
More informationAbstract. Keywords. 1. Introduction. Suhas Gajakosh 1,Mukta Takalikar 2
Multitenant Software as a Service: Application Development Approach Suhas Gajakosh 1,Mukta Takalikar 2 Abstract Software as a Service (SaaS) is bringing new revolution to IT industry. SaaS has changed
More informationVolume 6, Issue 1, January 2018 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) e-isjn: A4372-3114 Impact Factor: 7.327 Volume 6, Issue 1, January 2018 International Journal of Advance Research in Computer Science and Management Studies Research Article /
More informationSecure Data De-Duplication With Dynamic Ownership Management In Cloud Storage
Secure Data De-Duplication With Dynamic Ownership Management In Cloud Storage 1 A. Sumathi, PG Scholar, Department Of Computer Science And Engineering, Maha Barathi Engineering College, Chinna Salem, Villupuram,
More informationData Tagging and Data Locating In Cloud Based SOA
Data Tagging and Data Locating In Cloud Based SOA Boopathy.D Research Scholar Dr.G.R.D College of Science Coimbatore Tamilnadu ndboopathy@gmail.com R.Srividhya Assistant Professor Dr.G.R.D College of Science
More informationIndex Terms Authentication, Authentication technique, Cloud computing, Computing services, Multilevel authentication.
Volume 5, Issue 4, April 015 ISSN: 77 18X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Special Issue on Impact
More information