Chapter

Cloud Security Using 2-Factor Image Authentication Technique

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

Abstract

Cloud computing is being anticipated as the infrastructural basis of tomorrow's IT industry and continues to be a topic of interest of many new emerging IT firms. Cloud can deliver resources and services to computers and devices through internet. Since Cloud Computing involves outsourcing of sensitive data and critical information the security aspects of cloud need to be dealt carefully. Strong authentication, focusing mainly on user-authentication, acts as a pre-requisite for access control in the cloud environment. In this paper we discuss an efficient authentication mechanism to deal with the security threats that are faced by cloud. The method proposed in this paper prevents the confidential data and information of end users stored in a private cloud from unauthorized access by using a two-factor authentication involving shared image concept in addition with encrypted key authentication.MD5 hashing technique is used which takes binary pixel value of image as input and convert it into a 128-bit hash value. The overall process of authentication has been shown through experimental result and implementation which shows a series of snapshots taken from the chapter.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

ResearchGate has not been able to resolve any citations for this publication.
Conference Paper
Full-text available
Cloud computing is a natural fit for mobile security. Typical handsets have input constraints and practical computational and power limitations, which must be respected by mobile security technologies in order to be effective. We describe how cloud computing can address these issues. Our approach is based on a flexible framework for supporting authentication decisions we call TrustCube (to manage the authentication infrastructure) and on a behavioral authentication approach referred to as implicit authentication (to translate user behavior into authentication scores). The combination results in a new authentication paradigm for users of mobile technologies, one where an appropriate balance between usability and trust can be managed through flexible policies and dynamic tuning.
Conference Paper
Full-text available
Cloud computing is an emerging, on-demand and internet- based technology. It provides variety of services over internet such as, software, hardware, data storage and infrastructure. This technology has been used by worldwide customers to improve their business performance. However, to utilize these services by authorized customer, it is necessary to have strict authentication check. At present, authentication is done in several ways: such as, textual, graphical, bio-metric, 3D password and third party authentication. This paper presents the strict authentication system by introducing the multi-level authentication technique which generates/authenticates the password in multiple levels to access the cloud services. In this paper, details of proposed multilevel authentication technique are presented along with the architecture, activities, data flows, algorithms and probability of success in breaking authentication.
Article
Cloud computing provides people a way to share large mount of distributed resources belonging to different organizations. That is a good way to share many kinds of distributed resources, but it also makes security problems more complicate and more important for users than before. In this paper, we analyze some security requirements in cloud computing environment. Since the security problems both in software and hardware, we provided a method to build a trusted computing environment for cloud computing by integrating the trusted computing platform (TCP) into cloud computing system. We propose a new prototype system, in which cloud computing system is combined with Trusted Platform Support Service (TSS) and TSS is based on Trusted Platform Module (TPM). In this design, better effect can be obtained in authentication, role based access and data protection in cloud computing environment.
Business Analysis Evolution of Strong Authentication
  • Quorica
Be careful when you come to put your trust in the clouds
  • B Schneier