Abstract
Cloud computing and its distributed network is a proper solution for any data distribution. Cloud computing is the latest trend for deploying application and data sharing. Security is always an issue which always needs enhancement to protect from the intrusion and attackers. Two-factor data mechanism is given in latest algorithm for providing high-end security in the cloud system. There is a hardware device for key invocation is presented. It is able to provide security for authentication. The limitation of this approach is to carry additional hardware at all the places. Loosing of the device may interrupt data access. In this paper, we proposed an approach which helps in data security with three-way authentication. Additionally, this approach helps in replacing device dependency using a secure model. The proposed approach helps in effective three-factor security with low computational parameters. The computed parameter with different file size shows the efficiency of our proposed work over existing algorithm scenario. A three-factor authentication approach is effective while looking at security aspect compare to previously defined authentication techniques in cloud security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Chen, H.C.H., Hu, Y., Lee, P.P.C., Tang, Y.: NCCloud: A net-work-coding-based storage system in a cloud-of-clouds. IEEE Trans. Comput. 63(1), 31–44 (2014)
Wang, C., Wang, Q., Ren, K., Cao, N., Lou, W.: Toward secure and dependable storage services in cloud computing. IEEE Trans. Serv Comput. 5(2), 220–232 (2012)
Acharya, S., Polawar, A., Baldawa, P., Junghare, S., Pawar, P.Y.: Internet banking two factor authentication using smartphone. IJSER, IJSER 4(3), March edition (2013). ISSN 2229–5518
Chu, C.-K., Chow, S.S.M., Tzeng, W.-G., Zhou, J., Deng, R.H.: Key-aggregate cryptosystem for scalable data sharing in cloud storage. IEEE Trans. Parallel Distrib. Syst. 25(2), 468–477 (2014)
Ferretti, L., Colajanni, M., Marchetti, M.: Distributed, concurrent, and independent access to encrypted cloud databases. IEEE Trans. Parallel Distrib. Syst. 25(2), 437–446 (2014)
Yang, K., Jia, X., Ren, K., Zhang, B., Xie, R.: DAC-MACS: effective data access control for multiauthority cloud storage systems. IEEE Trans. Inf. Forensics Secur. 8(11), 1790–1801 (2013)
Dodis, Y., Kalai, Y.T., Lovett, S.: On cryptography with auxiliary input. In: Proceedings of 41st Annual ACM Symposium Theory Computing, pp. 621–630 (2009)
Naor, M., Segev, G.: Public-key cryptosystems resilient to key leakage. In: Proceedings of 29th Annual International Cryptology Conference, pp. 18–35 (2009)
Matsuo, T.: Proxy re-encryption systems for identity-based encryption. In: Proceedings pf 1st International Conference Pairing-Based Cryptography, pp. 247–267 (2007)
Liu, J.K., Zhou, J.: Efficient certificate-based encryption in the standard model. In: Proceedings of 6th International Conference Security Cryptography Network, pp. 144–155 (2008)
Hwang, Y.H., Liu, J.K., Chow, S.S.M.: Certificateless public key encryption secure against malicious KGC attacks in the standard model. J. UCS 14(3), 463–480 (2008)
Yang, K., Jia, X., Ren, K., Zhang, B., Xie, R.: DAC-MACS: effective data access control for multiauthority cloud storage systems. IEEE Trans. Inf. Forensics Secur. 8(11), 1790–1801 (2013)
Yap, W.-S., Chow, S.S.M., Heng, S.-H., Goi, B.M.: Security mediated certificate less signatures. In: Proceedings of 5th International Conference Applied Cryptography Network Security, pp. 459–477 (2007)
ManavSinghal and ShashikalaTapaswi: Software tokens based two factor authentication scheme. Int. J. Inf. Electr. Eng. 2(3), 383–386 (2012)
Sanka, S., Hota, C., M. Rajarajan, M. Secure data access in cloud computing. In: Proceedings of the 4th IEEE International Conference on Internet Multimedia Services, December 2010
Liu, J.K., Liang, K., Susilo, W., Liu, J., Xiang, Y.: Two-factor data security protection mechanism for cloud storage system. IEEE Trans. Comput. 65(6) 2016
Seo, J.H., Emura, K.: Efficient delegation of key generation and revocation functionalities in identity-based encryption. In: Proceedings of Cryptographers Track RSA Conference, pp. 343–358 (2013)
Lacona, L.J.: Lamport’s one-time password algorithm. A design pattern for securing client/service interactions with OTP. http://www.javaworld.com/article/2078022/open-source-tools/lamport-s-one-time-password-algorithm-or-don-t-talk-to-complete-strangers.html (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Dangi, R., Pawar, S. (2019). An Improved Authentication and Data Security Approach Over Cloud Environment. In: Yadav, N., Yadav, A., Bansal, J., Deep, K., Kim, J. (eds) Harmony Search and Nature Inspired Optimization Algorithms. Advances in Intelligent Systems and Computing, vol 741. Springer, Singapore. https://doi.org/10.1007/978-981-13-0761-4_100
Download citation
DOI: https://doi.org/10.1007/978-981-13-0761-4_100
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-0760-7
Online ISBN: 978-981-13-0761-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)