An Authentication Technique for Accessing De-Duplicated Data from Private Cloud using One Time Password

2017 ◽  
Vol 11 (2) ◽  
pp. 1-10 ◽  
Author(s):  
Prakash Mohan ◽  
Saravanakumar Chelliah

Objective: The main aim is to de-duplicate the redundant files in the cloud and also to improve the security of files in public cloud service by assigning privileges to the documents when it is uploaded by confidential user. Methods: To achieve the objective the authors have used the AES algorithm to encrypt the file stored after de-duplication in the cloud. De-duplication is done based on comparison of contents, file type and size. For an authorized user to access the file from the cloud, generation of OTP using SSL protocol is adopted. Findings: Files uploaded in the cloud are encrypted using traditional encryption algorithms which don't provide high levels of security. Files can be accessed by anyone who is authorized. Privileges are not considered. During de-duplication, only the name and size of the files are considered. Application: Files within the public cloud can't be viewed by everyone who has registered with the cloud. Those who have the respective privileges can only view the file. Proof of Ownership is assured. Since de-duplication is done based on the content redundancy within the cloud storage is avoided. Usage of OTP ensures that the content is viewed by the individuals who have the respective privileges related to the file. These concepts provide additional security to the files stored in the public environment.

2019 ◽  
pp. 435-445
Author(s):  
Prakash Mohan ◽  
Saravanakumar Chelliah

Objective: The main aim is to de-duplicate the redundant files in the cloud and also to improve the security of files in public cloud service by assigning privileges to the documents when it is uploaded by confidential user. Methods: To achieve the objective the authors have used the AES algorithm to encrypt the file stored after de-duplication in the cloud. De-duplication is done based on comparison of contents, file type and size. For an authorized user to access the file from the cloud, generation of OTP using SSL protocol is adopted. Findings: Files uploaded in the cloud are encrypted using traditional encryption algorithms which don't provide high levels of security. Files can be accessed by anyone who is authorized. Privileges are not considered. During de-duplication, only the name and size of the files are considered. Application: Files within the public cloud can't be viewed by everyone who has registered with the cloud. Those who have the respective privileges can only view the file. Proof of Ownership is assured. Since de-duplication is done based on the content redundancy within the cloud storage is avoided. Usage of OTP ensures that the content is viewed by the individuals who have the respective privileges related to the file. These concepts provide additional security to the files stored in the public environment.


2018 ◽  
Vol 7 (3.1) ◽  
pp. 128
Author(s):  
Selvam L ◽  
Arokia Renjit J

Recent security incidents on public cloud data storage had raised concerns on cloud data security. Development in the hacking area has risen in the past few years. Due to this, Cyber Security is needed which plays an important role to cover the secret information. Currently, the attack of challenging channel is both the symmetric as well as the asymmetric encryption algorithm. Since, in both criteria the secret key has to be transmitting through a security challenging channel. For this many techniques have been put forward. The Main focus is on the vulnerabilities of the private keys while hoarded in different places for the fast utilization of the round key of the AES algorithm. In the view of the hackers, extracting the private key is nearly as same as obtaining the plain text itself. So, the honey encryption technique is used to futile the attacker by producing the fake key for each and every try of the Key puncher. An indication will be generated automatically to the storage manager when an attempt is made by the attacker. The Honey encryption is the best algorithm to overcome the drawbacks of the AES algorithm but it has some time constraints which are also eliminated here. Thus, eliminating the Brute Force Attack and providing a secure system for storing the secret key.  


Processes ◽  
2020 ◽  
Vol 8 (1) ◽  
pp. 76
Author(s):  
KyungWoon Cho ◽  
Hyokyung Bahn

IaaS (Infrastructure as a Service) is a well-known computing service, which provides infrastructures over the cloud without owning real hardware resources. This is attractive as resources can be scaled up and down instantly according to the user’s computing demands. Customers of such services would like to adjust the utilization policy promptly by considering the charge of the service, but an instantaneous response is not possible as it takes several hours or even a couple of days for cloud service providers to inform the billing information. In this article, we present an instant cost estimation model for estimating the cost of public cloud resources. Specifically, our model estimates the cost of IaaS by monitoring the usage of resources on behalf of virtual machine instances. As this is performed by generating a user-side metering daemon, it is very precise and thus similar to the resource usage evaluated by the cloud service provider. To validate our model, we run PC laboratory services for 50 students in two classes by making use of a public cloud during a semester. Experimental results show that the accuracy of our model is over 99.3% in comparison with the actual charge of the public cloud.


2020 ◽  
Vol 8 (5) ◽  
pp. 3135-3141

Public Key Infrastructure (PKI) is a repository and management system for digital certificates. It can be the centralized or decentralized PKI system for issuing, managing, storing, verifying and distributing the key pairs, public key and private key, or one of the public key certificates. In public cloud, Data Owners and Data Users can upload or download their encrypted data along with services, resources and infrastructures in the hands of Cloud Service Provider. It creates the big security concerns in terms of data security and data privacy for the user and Cloud Service Provider is the sole responsibility to provide the Access Control Policy to restrict the cloud services centrally. With the emergence of cloud computing, Public Key Infrastructure (PKI) technology enables the secure communications in between systems. X.509 certificates are based on the centralized PKI and suffers so many issues in the public cloud. Gnu Privacy Guard (GnuPG) certificates are based on the decentralized PKI system. Imagine a world with decentralized PKI system in which each Kerberos is also a Central Authority for issuing certificates to the system or users. This proposed collaborative PKI framework describes the use of PKI in public cloud, proposed algorithm for Kerberos SSO token and provides acquisition of Public Key certificates from the client via Kerberized Central Authorities.


2012 ◽  
Vol 198-199 ◽  
pp. 435-438
Author(s):  
You Chan Zhu ◽  
Peng Liu ◽  
Jun Ting Wang

This paper first analyzes the security issues that are hidden in the public Cloud Computing environments, then puts forward to the corresponding solutions of various security issues, and lastly summarizes the importance of choosing suitable cloud service for enterprises.


Author(s):  
M. Chaitanya ◽  
K. Durga Charan

Load balancing makes cloud computing greater knowledgeable and could increase client pleasure. At reward cloud computing is among the all most systems which offer garage of expertise in very lowers charge and available all the time over the net. However, it has extra vital hassle like security, load administration and fault tolerance. Load balancing inside the cloud computing surroundings has a large impact at the presentation. The set of regulations relates the sport idea to the load balancing manner to amplify the abilties in the public cloud environment. This textual content pronounces an extended load balance mannequin for the majority cloud concentrated on the cloud segregating proposal with a swap mechanism to select specific strategies for great occasions.


2013 ◽  
Vol 869-870 ◽  
pp. 791-795
Author(s):  
Zhi Yuan Hu ◽  
De Xiang Zhou

On the contemporary, human beings are facing serious environmental problems. The Environmental system in which human beings are living and the construction of peoples livelihood is not two mutually fragmented systems. The problems of ecological environment have many important implications on the contemporary peoples livelihood, affecting a country's social stability and public political participation. For this effect, our government should actively response to it. With the guidance of scientific development view, we should strengthen the treatment of ecological environment, coordinate the conflicts of environmental interest fairly, unimpeded channels to promote active participation in the public environment, strengthening international environmental cooperation and exchanges so as to make the treatment of ecological environment and the construction of peoples livelihood to achieve the progress and development.


Sign in / Sign up

Export Citation Format

Share Document