Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  An Elevated Approach for Securing Data using Two Factor Authentication in Cloud Storage System  
  Authors : Md. Sohel Ahammed; Md. Nahid Newaz
  Cite as:

 

Cloud computing is an internet-based computing systems where online virtual shared resources are instructed by the user as required on their needs. As our modern technology has a vast amount of digital information which can be managed by cloud computing systems so it is a new mechanism to distribute products from producer to consumer in a very different and effective style of computing. With some advantages of cloud storage system, it has a security flaws in accessing data from another user over the internet. Different types of attack can be done by the third party when sharing file is distributed among the users and hacker will get a unauthorized access to these sharing files. By distributing sharing access or storage with many other users, it is conceivable for another user to hack their data. This paper discusses the two-factor authentications mechanisms(2FA) for the cloud computing security concerns on shared resources and the way for resolving the security risk on cloud computing devices, resources, and the security credentials risk mitigation method or algorithm when a user wants to access a storage system into the cloud.

 

Published In : IJCSN Journal Volume 8, Issue 1

Date of Publication : February 2019

Pages : 85-90

Figures :05

Tables : --

 

Md. Sohel Ahammed : is working as the lecturer at dept. of Computer Science & Engineering at Bangladesh University of Business and Technology, Dhaka, Bangladesh. He has achieved B.Sc. Engineering in Computer Science and Engineering from Rajshahi University of Engineering & Technology (RUET) and pursuing M.Sc. IICT at BUET. Three publication has been published in international refereed journal and conference. His research interest is like Artificial Intelligence, Pattern Recognition, Deep learning, Data mining, and Cyber Security.

Md. Nahid Newaz : is currently working as a lecturer at Computer Science and Engineering department at Bangladesh University of Business and Technology (BUBT). He Completed his B. Sc. Degree from University of Dhaka in 2015. His primary research interest is Machine learning, cloud computing, data mining, and network security.

 

Cloud Computing, Encryption, Decryption, Two Factor Authentication, Cipher-text, and Plain-text

This paper demonstrates that 2FA systems is a secure process for sharing the data into cloud server. If we avoid the data distribution from multiple access from the unauthorized user, this process will be very efficient in the cloud computing sector. This system target is to enhance the security and confidentiality of the data and give the revocability of the device. Once the device is revoked then SDAM will offer new unique or personal security device to user.

 

[1] Z. Xia, X. Wang, X. Sun, and Q. Wang, "A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data,"IEEE Transactions on Parallel and Distributed Systems, vol. 27, pp. 340-352, 2016. [2] Joel Gibson, Darren Eveleigh, Robin Rondeau, Qing Tan,"Benefits and Challenges of Three Cloud Computing Service Models", 978-1-4673-4794- 5/12/$31.00_c 2012 IEEE". [3] G.A.Patil,S. B. Patil, "Data Security Mechanism for Cloud", International Conference on Emerging Technology Trends (ICETT) 2011 Proceedings published by International Journal of Computer Applications (IJCA), pages 24- 27, 2011 [4] Sanka, Sunil, Chittaranjan Hota, and Muttukrishnan Rajarajan. "Secure data access in cloud computing." Internet Multimedia Services Architecture and Application (IMSAA), 2010 IEEE 4th International Conference on. IEEE,2010 [5] Bethencourt, J., Sahai, A. and Waters, B., 2007, May. Ciphertext-policy attribute-based encryption. In Security and Privacy, 2007. SP'07. IEEE Symposium on (pp. 321- 334). IEEE [6] Weber, S.G., 2013. Designing a Hybrid Attribute- Based Encryption Scheme Supporting Dynamic Attributes. IACR Cryptology ePrint Archive, 2013, p.219. [7] (TutorialsPoint Online Sources) Web Resources (year, month, day). Title (edition) [Type of medium]. Volume (issue). Available: https://www.tutorialspoint.com/cryptography/public_ke y_infrastructure.htm [8] D. Boneh and M. Franklin. Identity-based encryption from the weil pairing. In CRYPTO '01, volume 2139 of LNCS, pages 213-229. Springer, 2001. [9] Liu, J.K., Liang, K., Susilo, W., Liu, J. and Xiang, Y., 2016. Two-factor data security protection mechanism for cloud storage system. IEEE Transactions on Computers, 65(6), pp.1992-2004. [10] (PDF Online Sources) Web Resources (year, month, day). Title (edition) [Type of medium]. Volume (issue). Available:http://www.ijariie.com/AdminUploadPdf/Impro ve_Data_Security_Protection_Mechanism_For _Cloud_Storage_Using_Two_Components_ijariie3292.pd f