Skip to main content

2020 | OriginalPaper | Buchkapitel

Data Security in Cloud Computing Using Three-Factor Authentication

verfasst von : Sunanda Nalajala, B. Moukthika, M. Kaivalya, K. Samyuktha, N. L. Pratap

Erschienen in: International Conference on Communication, Computing and Electronics Systems

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud storage is tremendously increasing its services, huge range of storage and communication of massive data over network. This practically has an adverse effect on the way of upholding this data, when it especially comes to the privacy of the user-secured and highly confidential data. We first view you with a system that is vulnerable to this authentication protocol with its misuse of biometrics and incorrect password generates no user to lost the mobile device. We even went along with this scheme and gave out a major issue to overcome with impersonation attack. However, this scheme makes the way easy to attack for offline password guessing attack. We included a three-factor authentication which carries the smart card into card reader, gets the password and identity and conveys the user details’ requesting time. We then came up with a scheme to overcome these security flaws of this prescribed authentication scheme combining passwords, mobile devices and biometrics. The proposed system is robust three-factor authentication with the help of password, biometrics and mobile device which provides reliable security strength to the user’s data and makes counterattack to existing attack, giving with more benefits compared to the previous scheme. This scheme will not only encounters with the security issues, but also provides with most enhanced security functionalities.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Dinh, H.T., et al.: A survey of mobile cloud computing: architecture, applications, and approaches. Wirel. Commun. Mob. Comput. 13(18), 1587–1611 (2013)CrossRef Dinh, H.T., et al.: A survey of mobile cloud computing: architecture, applications, and approaches. Wirel. Commun. Mob. Comput. 13(18), 1587–1611 (2013)CrossRef
2.
Zurück zum Zitat Jiang, Q., Ma, J., Wei, F.: On the security of a privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Syst. J. (2018) Jiang, Q., Ma, J., Wei, F.: On the security of a privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Syst. J. (2018)
3.
Zurück zum Zitat Jiang, Q., Khan, M.K., Lu, X., Ma, J., He, D.: A privacy preserving three-factor authentication protocol for e-health clouds. J. Supercomput. (2016) Jiang, Q., Khan, M.K., Lu, X., Ma, J., He, D.: A privacy preserving three-factor authentication protocol for e-health clouds. J. Supercomput. (2016)
4.
Zurück zum Zitat Cybernetics approaches in intelligent systems. Springer Science and Business Media LLC (2018) Cybernetics approaches in intelligent systems. Springer Science and Business Media LLC (2018)
5.
Zurück zum Zitat He, D., Zeadally, S., Kumar, N., Lee, J.H.: Anonymous authentication for wireless body area networks with provable security. IEEE Syst. J. (2016) He, D., Zeadally, S., Kumar, N., Lee, J.H.: Anonymous authentication for wireless body area networks with provable security. IEEE Syst. J. (2016)
6.
Zurück zum Zitat Jiang, Q., Kumar, N., Ma, J., Shen, J., He, D., Chilamkurti, N.: A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks. Int. J. Netw. Manag. (2017) Jiang, Q., Kumar, N., Ma, J., Shen, J., He, D., Chilamkurti, N.: A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks. Int. J. Netw. Manag. (2017)
7.
Zurück zum Zitat Vinod, A.R.: Hindering data theft attack through fog computing. Int. J. Res. Eng. Technol. (2014) Vinod, A.R.: Hindering data theft attack through fog computing. Int. J. Res. Eng. Technol. (2014)
8.
Zurück zum Zitat Praveena, A., Smys, S.: Ensuring data security in cloud based social networks. In: 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA), vol. 2, pp. 289–295. IEEE, 2017 Praveena, A., Smys, S.: Ensuring data security in cloud based social networks. In: 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA), vol. 2, pp. 289–295. IEEE, 2017
9.
Zurück zum Zitat Karthiban, K., Smys, S.: Privacy preserving approaches in cloud computing. In: 2018 2nd International Conference on Inventive Systems and Control (ICISC), pp. 462–467. IEEE, 2018 Karthiban, K., Smys, S.: Privacy preserving approaches in cloud computing. In: 2018 2nd International Conference on Inventive Systems and Control (ICISC), pp. 462–467. IEEE, 2018
Metadaten
Titel
Data Security in Cloud Computing Using Three-Factor Authentication
verfasst von
Sunanda Nalajala
B. Moukthika
M. Kaivalya
K. Samyuktha
N. L. Pratap
Copyright-Jahr
2020
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-2612-1_33