Skip to main content

An Improved Authentication and Data Security Approach Over Cloud Environment

  • Conference paper
  • First Online:
Harmony Search and Nature Inspired Optimization Algorithms

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 741))

Abstract

Cloud computing and its distributed network is a proper solution for any data distribution. Cloud computing is the latest trend for deploying application and data sharing. Security is always an issue which always needs enhancement to protect from the intrusion and attackers. Two-factor data mechanism is given in latest algorithm for providing high-end security in the cloud system. There is a hardware device for key invocation is presented. It is able to provide security for authentication. The limitation of this approach is to carry additional hardware at all the places. Loosing of the device may interrupt data access. In this paper, we proposed an approach which helps in data security with three-way authentication. Additionally, this approach helps in replacing device dependency using a secure model. The proposed approach helps in effective three-factor security with low computational parameters. The computed parameter with different file size shows the efficiency of our proposed work over existing algorithm scenario. A three-factor authentication approach is effective while looking at security aspect compare to previously defined authentication techniques in cloud security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chen, H.C.H., Hu, Y., Lee, P.P.C., Tang, Y.: NCCloud: A net-work-coding-based storage system in a cloud-of-clouds. IEEE Trans. Comput. 63(1), 31–44 (2014)

    Google Scholar 

  2. Wang, C., Wang, Q., Ren, K., Cao, N., Lou, W.: Toward secure and dependable storage services in cloud computing. IEEE Trans. Serv Comput. 5(2), 220–232 (2012)

    Google Scholar 

  3. Acharya, S., Polawar, A., Baldawa, P., Junghare, S., Pawar, P.Y.: Internet banking two factor authentication using smartphone. IJSER, IJSER 4(3), March edition (2013). ISSN 2229–5518

    Google Scholar 

  4. Chu, C.-K., Chow, S.S.M., Tzeng, W.-G., Zhou, J., Deng, R.H.: Key-aggregate cryptosystem for scalable data sharing in cloud storage. IEEE Trans. Parallel Distrib. Syst. 25(2), 468–477 (2014)

    Article  Google Scholar 

  5. Ferretti, L., Colajanni, M., Marchetti, M.: Distributed, concurrent, and independent access to encrypted cloud databases. IEEE Trans. Parallel Distrib. Syst. 25(2), 437–446 (2014)

    Article  Google Scholar 

  6. Yang, K., Jia, X., Ren, K., Zhang, B., Xie, R.: DAC-MACS: effective data access control for multiauthority cloud storage systems. IEEE Trans. Inf. Forensics Secur. 8(11), 1790–1801 (2013)

    Article  Google Scholar 

  7. Dodis, Y., Kalai, Y.T., Lovett, S.: On cryptography with auxiliary input. In: Proceedings of 41st Annual ACM Symposium Theory Computing, pp. 621–630 (2009)

    Google Scholar 

  8. Naor, M., Segev, G.: Public-key cryptosystems resilient to key leakage. In: Proceedings of 29th Annual International Cryptology Conference, pp. 18–35 (2009)

    Google Scholar 

  9. Matsuo, T.: Proxy re-encryption systems for identity-based encryption. In: Proceedings pf 1st International Conference Pairing-Based Cryptography, pp. 247–267 (2007)

    Google Scholar 

  10. Liu, J.K., Zhou, J.: Efficient certificate-based encryption in the standard model. In: Proceedings of 6th International Conference Security Cryptography Network, pp. 144–155 (2008)

    Google Scholar 

  11. Hwang, Y.H., Liu, J.K., Chow, S.S.M.: Certificateless public key encryption secure against malicious KGC attacks in the standard model. J. UCS 14(3), 463–480 (2008)

    Google Scholar 

  12. Yang, K., Jia, X., Ren, K., Zhang, B., Xie, R.: DAC-MACS: effective data access control for multiauthority cloud storage systems. IEEE Trans. Inf. Forensics Secur. 8(11), 1790–1801 (2013)

    Article  Google Scholar 

  13. Yap, W.-S., Chow, S.S.M., Heng, S.-H., Goi, B.M.: Security mediated certificate less signatures. In: Proceedings of 5th International Conference Applied Cryptography Network Security, pp. 459–477 (2007)

    Google Scholar 

  14. ManavSinghal and ShashikalaTapaswi: Software tokens based two factor authentication scheme. Int. J. Inf. Electr. Eng. 2(3), 383–386 (2012)

    Google Scholar 

  15. Sanka, S., Hota, C., M. Rajarajan, M. Secure data access in cloud computing. In: Proceedings of the 4th IEEE International Conference on Internet Multimedia Services, December 2010

    Google Scholar 

  16. Liu, J.K., Liang, K., Susilo, W., Liu, J., Xiang, Y.: Two-factor data security protection mechanism for cloud storage system. IEEE Trans. Comput. 65(6) 2016

    Google Scholar 

  17. Seo, J.H., Emura, K.: Efficient delegation of key generation and revocation functionalities in identity-based encryption. In: Proceedings of Cryptographers Track RSA Conference, pp. 343–358 (2013)

    Google Scholar 

  18. Lacona, L.J.: Lamport’s one-time password algorithm. A design pattern for securing client/service interactions with OTP. http://www.javaworld.com/article/2078022/open-source-tools/lamport-s-one-time-password-algorithm-or-don-t-talk-to-complete-strangers.html (2009)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ramraj Dangi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dangi, R., Pawar, S. (2019). An Improved Authentication and Data Security Approach Over Cloud Environment. In: Yadav, N., Yadav, A., Bansal, J., Deep, K., Kim, J. (eds) Harmony Search and Nature Inspired Optimization Algorithms. Advances in Intelligent Systems and Computing, vol 741. Springer, Singapore. https://doi.org/10.1007/978-981-13-0761-4_100

Download citation

Publish with us

Policies and ethics