Multi-level Authentication-Based Secure Aware Data Transaction on Cloud Using Cyclic Shift Transposition Algorithm
Cloud computing is used for the sake of storing, managing, and processing data on a remote server network hosted on the Internet, rather than a local server or a personal computer. While numerous data volume is saved in the cloud, the stored data within the cloud have some security issues. It is therefore essential that data stored in the cloud are secure. Therefore, in this paper, multi-level authentication-based secure aware data transaction on cloud is proposed. The proposed system consists of three modules, namely multi-level authentication, data security, and data retrieval. To avoid the unauthorized user login to the server, novel multi-level authentication is developed. In this model, data security is improved with the help of cyclic shift transposition algorithm. To avoid the real-time attack during the data transaction retrieval process, hash-based timestamp is used. In terms of time and memory, the proposed methodology is evaluated.
KeywordsCloud computing Multi-level authentication Cyclic shift transposition algorithm Security Data transaction
- 4.Kandil A, El-Deeb H (2016) Exploration of application migration to cloud environment. In 2016 6th international conference-cloud system and big data engineering (Confluence) IEEE, pp 109–114Google Scholar
- 5.Basu S, Pattnaik PK (2017) A consistency preservation based approach for data-intensive cloud computing environment. In 2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT), IEEE, pp 1–5Google Scholar
- 9.Wei J, Liu W, Hu X (2016) Secure data sharing in cloud computing using revocable-storage identity-based encryption. IEEE Trans Cloud Comput 1–1Google Scholar