Cloud computing is an internet-based computing systems where online virtual shared resources are instructed by the user as
required on their needs. As our modern technology has a vast amount of digital information which can be managed by cloud computing
systems so it is a new mechanism to distribute products from producer to consumer in a very different and effective style of computing.
With some advantages of cloud storage system, it has a security flaws in accessing data from another user over the internet. Different
types of attack can be done by the third party when sharing file is distributed among the users and hacker will get a unauthorized access
to these sharing files. By distributing sharing access or storage with many other users, it is conceivable for another user to hack their
data. This paper discusses the two-factor authentications mechanisms(2FA) for the cloud computing security concerns on shared
resources and the way for resolving the security risk on cloud computing devices, resources, and the security credentials risk mitigation
method or algorithm when a user wants to access a storage system into the cloud.
Published In:IJCSN Journal Volume 8, Issue 1
Date of Publication : February 2019
Pages : 85-90
Figures :05
Tables : --
Md. Sohel Ahammed :
is working as the lecturer at
dept. of Computer Science & Engineering at Bangladesh
University of Business and Technology, Dhaka, Bangladesh. He
has achieved B.Sc. Engineering in Computer Science and
Engineering from Rajshahi University of Engineering &
Technology (RUET) and pursuing M.Sc. IICT at BUET. Three
publication has been published in international refereed journal
and conference. His research interest is like Artificial Intelligence,
Pattern Recognition, Deep learning, Data mining, and Cyber
Security.
Md. Nahid Newaz :
is currently working as a
lecturer at Computer Science and Engineering department at
Bangladesh University of Business and Technology (BUBT). He
Completed his B. Sc. Degree from University of Dhaka in 2015.
His primary research interest is Machine learning, cloud
computing, data mining, and network security.
Cloud Computing, Encryption, Decryption, Two Factor Authentication, Cipher-text, and Plain-text
This paper demonstrates that 2FA systems is a secure
process for sharing the data into cloud server. If we avoid
the data distribution from multiple access from the
unauthorized user, this process will be very efficient in the
cloud computing sector. This system target is to enhance
the security and confidentiality of the data and give the
revocability of the device. Once the device is revoked
then SDAM will offer new unique or personal security
device to user.
[1] Z. Xia, X. Wang, X. Sun, and Q. Wang, "A secure and
dynamic multi-keyword ranked search scheme over
encrypted cloud data,"IEEE Transactions on Parallel and
Distributed Systems, vol. 27, pp. 340-352, 2016.
[2] Joel Gibson, Darren Eveleigh, Robin Rondeau, Qing
Tan,"Benefits and Challenges of Three Cloud
Computing Service Models", 978-1-4673-4794-
5/12/$31.00_c 2012 IEEE".
[3] G.A.Patil,S. B. Patil, "Data Security Mechanism for
Cloud", International Conference on Emerging
Technology Trends (ICETT) 2011 Proceedings
published by International Journal of Computer
Applications (IJCA), pages 24- 27, 2011
[4] Sanka, Sunil, Chittaranjan Hota, and Muttukrishnan
Rajarajan. "Secure data access in cloud computing."
Internet Multimedia Services Architecture and
Application (IMSAA), 2010 IEEE 4th International
Conference on. IEEE,2010
[5] Bethencourt, J., Sahai, A. and Waters, B., 2007, May.
Ciphertext-policy attribute-based encryption. In Security and Privacy, 2007. SP'07. IEEE Symposium on (pp. 321-
334). IEEE
[6] Weber, S.G., 2013. Designing a Hybrid Attribute-
Based Encryption Scheme Supporting Dynamic
Attributes. IACR Cryptology ePrint Archive, 2013,
p.219.
[7] (TutorialsPoint Online Sources) Web Resources (year,
month, day). Title (edition) [Type of medium]. Volume
(issue). Available:
https://www.tutorialspoint.com/cryptography/public_ke
y_infrastructure.htm
[8] D. Boneh and M. Franklin. Identity-based encryption
from the weil pairing. In CRYPTO '01, volume 2139
of LNCS, pages 213-229. Springer, 2001.
[9] Liu, J.K., Liang, K., Susilo, W., Liu, J. and Xiang, Y.,
2016. Two-factor data security protection mechanism for
cloud storage system. IEEE Transactions on Computers,
65(6), pp.1992-2004.
[10] (PDF Online Sources) Web Resources (year, month, day).
Title (edition) [Type of medium]. Volume (issue).
Available:http://www.ijariie.com/AdminUploadPdf/Impro
ve_Data_Security_Protection_Mechanism_For
_Cloud_Storage_Using_Two_Components_ijariie3292.pd
f