Two Factor Authentication Access Control for Web Based Cloud Computing
نویسندگان
چکیده
1PG Student, Department of CSE, Global Academy of Technology, Bengaluru, Karnataka, India 2Assistant Professor, Department of CSE, Global Academy of Technology, Bengaluru, Karnataka, India 3Professor, Department of CSE, Global Academy of Technology, Bengaluru, Karnataka, India 4Professor & HOD, Department of CSE, Global Academy of Technology, Bengaluru, Karnataka, India ---------------------------------------------------------------------***--------------------------------------------------------------------Abstract In this paper, we tend to introduce a Two-factor authentication (2FA) access system for web-based cloud computing services. Specifically, in our planned 2FA access system, attribute-based access management mechanism is enforced with the need of each a user secret key and a lightweight security device. As a user cannot access the system if they are doing not hold each, the mechanism will enhance the protection of the system, particularly in those eventualities wherever several users share an equivalent laptop for webbased cloud services. additionally, attribute-based management within the system additionally allows the cloud server to limit the access to those users with an equivalent set of attributes whereas conserving user privacy, i.e., the cloud server solely is aware of that the user fulfills the desired predicate, however has no plan on the precise identity of the user.
منابع مشابه
DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملKey Factor Authentication and Access Control for Accessing Cloud Computing Services
In this paper, the new algorithm named Key Factor Authentication and Access Control (KFAAC) is used to ensure the security and access control of cloud services from the clients. Cloud and Web services becoming more popular in recent days. Instead of using offline applications peoples intended to use online applications and services with updated features with recent crisis. Providing best servic...
متن کاملRESCUE: Reputation based Service for Cloud User Environment
Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...
متن کاملData Replication-Based Scheduling in Cloud Computing Environment
Abstract— High-performance computing and vast storage are two key factors required for executing data-intensive applications. In comparison with traditional distributed systems like data grid, cloud computing provides these factors in a more affordable, scalable and elastic platform. Furthermore, accessing data files is critical for performing such applications. Sometimes accessing data becomes...
متن کاملبررسی تأثیرات رایانش ابری بر یادگیری الکترونیکی
In the world of training, online training is introduced as a modern model of training services. Cloud computing is a modern technology which is provided software, infrastructure and platform as internet. Also, online training is introduced as a modern model of training services on the web. In this research, the impact of cloud computing on e-learning on the case of Mehralborz online university ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017